Linux version 5.14.0-254.1844_765618331.el9 [ 0.000000] The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. [ 0.000000] Command line: BOOT_IMAGE=(hd0,msdos1)/vmlinuz-5.14.0-254.1844_765618331.el9.x86_64+debug root=/dev/mapper/cs_kvm--06--guest28-root ro crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M resume=/dev/mapper/cs_kvm--06--guest28-swap rd.lvm.lv=cs_kvm-06-guest28/root rd.lvm.lv=cs_kvm-06-guest28/swap console=ttyS0,115200 [ 0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' [ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 0.000000] x86/fpu: xstate_offset[3]: 960, xstate_sizes[3]: 64 [ 0.000000] x86/fpu: xstate_offset[4]: 1024, xstate_sizes[4]: 64 [ 0.000000] x86/fpu: xstate_offset[5]: 1088, xstate_sizes[5]: 64 [ 0.000000] x86/fpu: xstate_offset[6]: 1152, xstate_sizes[6]: 512 [ 0.000000] x86/fpu: xstate_offset[7]: 1664, xstate_sizes[7]: 1024 [ 0.000000] x86/fpu: xstate_offset[9]: 2688, xstate_sizes[9]: 8 [ 0.000000] x86/fpu: Enabled xstate features 0x2ff, context size is 2696 bytes, using 'standard' format. [ 0.000000] signal: max sigframe size: 3632 [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable [ 0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000bfff9fff] usable [ 0.000000] BIOS-e820: [mem 0x00000000bfffa000-0x00000000bfffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] SMBIOS 2.4 present. [ 0.000000] DMI: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 0.000000] Hypervisor detected: KVM [ 0.000000] kvm-clock: Using msrs 4b564d01 and 4b564d00 [ 0.000011] kvm-clock: using sched offset of 2601344594230454 cycles [ 0.000025] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns [ 0.000058] tsc: Detected 2095.076 MHz processor [ 0.000893] last_pfn = 0x140000 max_arch_pfn = 0x400000000 [ 0.000986] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 0.001019] last_pfn = 0xbfffa max_arch_pfn = 0x400000000 [ 0.015895] found SMP MP-table at [mem 0x000f6390-0x000f639f] [ 0.016037] Using GB pages for direct mapping [ 0.017566] RAMDISK: [mem 0x339ce000-0x35cdefff] [ 0.017616] ACPI: Early table checksum verification disabled [ 0.017670] ACPI: RSDP 0x00000000000F61A0 000014 (v00 BOCHS ) [ 0.017706] ACPI: RSDT 0x00000000BFFFFB40 000030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) [ 0.017747] ACPI: FACP 0x00000000BFFFF177 000074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) [ 0.017776] ACPI: DSDT 0x00000000BFFFE040 001137 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) [ 0.017795] ACPI: FACS 0x00000000BFFFE000 000040 [ 0.017811] ACPI: SSDT 0x00000000BFFFF1EB 0008D5 (v01 BOCHS BXPCSSDT 00000001 BXPC 00000001) [ 0.017828] ACPI: APIC 0x00000000BFFFFAC0 000080 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) [ 0.017843] ACPI: Reserving FACP table memory at [mem 0xbffff177-0xbffff1ea] [ 0.017849] ACPI: Reserving DSDT table memory at [mem 0xbfffe040-0xbffff176] [ 0.017854] ACPI: Reserving FACS table memory at [mem 0xbfffe000-0xbfffe03f] [ 0.017859] ACPI: Reserving SSDT table memory at [mem 0xbffff1eb-0xbffffabf] [ 0.017863] ACPI: Reserving APIC table memory at [mem 0xbffffac0-0xbffffb3f] [ 0.018607] No NUMA configuration found [ 0.018618] Faking a node at [mem 0x0000000000000000-0x000000013fffffff] [ 0.018645] NODE_DATA(0) allocated [mem 0x13ffd5000-0x13fffffff] [ 0.019900] Reserving 256MB of memory at 2800MB for crashkernel (System RAM: 4095MB) [ 0.079391] Zone ranges: [ 0.079401] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.079412] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 0.079420] Normal [mem 0x0000000100000000-0x000000013fffffff] [ 0.079428] Device empty [ 0.079435] Movable zone start for each node [ 0.079441] Early memory node ranges [ 0.079444] node 0: [mem 0x0000000000001000-0x000000000009efff] [ 0.079450] node 0: [mem 0x0000000000100000-0x00000000bfff9fff] [ 0.079455] node 0: [mem 0x0000000100000000-0x000000013fffffff] [ 0.079467] Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] [ 0.079490] On node 0, zone DMA: 1 pages in unavailable ranges [ 0.079741] On node 0, zone DMA: 97 pages in unavailable ranges [ 0.132460] On node 0, zone Normal: 6 pages in unavailable ranges [ 0.891655] kasan: KernelAddressSanitizer initialized [ 0.892366] ACPI: PM-Timer IO Port: 0x608 [ 0.892420] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) [ 0.892521] IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 [ 0.892544] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) [ 0.892552] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) [ 0.892557] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 0.892573] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) [ 0.892579] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) [ 0.892595] ACPI: Using ACPI (MADT) for SMP configuration information [ 0.892611] TSC deadline timer available [ 0.892622] smpboot: Allowing 2 CPUs, 0 hotplug CPUs [ 0.892807] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 0.892822] PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] [ 0.892831] PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] [ 0.892835] PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] [ 0.892843] PM: hibernation: Registered nosave memory: [mem 0xbfffa000-0xbfffffff] [ 0.892847] PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] [ 0.892851] PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] [ 0.892855] PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] [ 0.892859] PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] [ 0.892876] [mem 0xc0000000-0xfeffbfff] available for PCI devices [ 0.892882] Booting paravirtualized kernel on KVM [ 0.892908] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns [ 0.916460] setup_percpu: NR_CPUS:8192 nr_cpumask_bits:2 nr_cpu_ids:2 nr_node_ids:1 [ 0.926799] percpu: Embedded 515 pages/cpu s2072576 r8192 d28672 u4194304 [ 0.927089] kvm-guest: PV spinlocks enabled [ 0.927116] PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) [ 0.927176] Fallback order for Node 0: 0 [ 0.927211] Built 1 zonelists, mobility grouping on. Total pages: 1031930 [ 0.927216] Policy zone: Normal [ 0.927223] Kernel command line: BOOT_IMAGE=(hd0,msdos1)/vmlinuz-5.14.0-254.1844_765618331.el9.x86_64+debug root=/dev/mapper/cs_kvm--06--guest28-root ro crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M resume=/dev/mapper/cs_kvm--06--guest28-swap rd.lvm.lv=cs_kvm-06-guest28/root rd.lvm.lv=cs_kvm-06-guest28/swap console=ttyS0,115200 [ 0.927895] Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/vmlinuz-5.14.0-254.1844_765618331.el9.x86_64+debug", will be passed to user space. [ 0.931701] Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) [ 0.933605] Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) [ 0.933830] mem auto-init: stack:off, heap alloc:off, heap free:off [ 0.933842] Stack Depot early init allocating hash table with memblock_alloc, 8388608 bytes [ 0.941401] software IO TLB: area num 2. [ 2.141914] Memory: 2836108K/4193888K available (38920K kernel code, 13007K rwdata, 14984K rodata, 5300K init, 42020K bss, 1355884K reserved, 0K cma-reserved) [ 2.141972] random: get_random_u64 called from kmem_cache_open+0x22/0x380 with crng_init=0 [ 2.144958] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 [ 2.144975] kmemleak: Kernel memory leak detector disabled [ 2.148824] Kernel/User page tables isolation: enabled [ 2.149172] ftrace: allocating 45745 entries in 179 pages [ 2.207559] ftrace: allocated 179 pages with 5 groups [ 2.212502] Dynamic Preempt: voluntary [ 2.213075] Running RCU self tests [ 2.213117] rcu: Preemptible hierarchical RCU implementation. [ 2.213126] rcu: RCU lockdep checking is enabled. [ 2.213134] rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=2. [ 2.213140] rcu: RCU callback double-/use-after-free debug is enabled. [ 2.213144] Trampoline variant of Tasks RCU enabled. [ 2.213148] Rude variant of Tasks RCU enabled. [ 2.213151] Tracing variant of Tasks RCU enabled. [ 2.213155] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. [ 2.213159] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 [ 2.237228] NR_IRQS: 524544, nr_irqs: 440, preallocated irqs: 16 [ 2.237985] rcu: srcu_init: Setting srcu_struct sizes based on contention. [ 2.238060] random: crng init done (trusting CPU's manufacturer) [ 2.244225] Console: colour *CGA 80x25 [ 2.449986] printk: console [ttyS0] enabled [ 2.450946] Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar [ 2.452687] ... MAX_LOCKDEP_SUBCLASSES: 8 [ 2.453624] ... MAX_LOCK_DEPTH: 48 [ 2.454575] ... MAX_LOCKDEP_KEYS: 8192 [ 2.455561] ... CLASSHASH_SIZE: 4096 [ 2.456542] ... MAX_LOCKDEP_ENTRIES: 65536 [ 2.457554] ... MAX_LOCKDEP_CHAINS: 131072 [ 2.458586] ... CHAINHASH_SIZE: 65536 [ 2.459591] memory used by lock dependency info: 11641 kB [ 2.460826] memory used for stack traces: 4224 kB [ 2.461906] per task-struct memory footprint: 2688 bytes [ 2.463335] ACPI: Core revision 20211217 [ 2.465183] APIC: Switch to symmetric I/O mode setup [ 2.466751] x2apic enabled [ 2.467847] Switched APIC routing to physical x2apic. [ 2.471442] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 [ 2.473657] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x1e33052aadd, max_idle_ns: 440795310221 ns [ 2.478316] Calibrating delay loop (skipped) preset value.. 4190.15 BogoMIPS (lpj=2095076) [ 2.481259] pid_max: default: 32768 minimum: 301 [ 2.484833] LSM: Security Framework initializing [ 2.486491] Yama: becoming mindful. [ 2.488428] SELinux: Initializing. [ 2.490842] LSM support for eBPF active [ 2.493493] Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) [ 2.495322] Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) [ 2.503310] Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 [ 2.504251] Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 [ 2.506269] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 2.509252] Spectre V2 : Mitigation: IBRS [ 2.511249] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch [ 2.514249] Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT [ 2.516249] RETBleed: Mitigation: IBRS [ 2.517260] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier [ 2.520250] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl [ 2.523307] MDS: Mitigation: Clear CPU buffers [ 2.525248] TAA: Mitigation: Clear CPU buffers [ 2.526249] MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode [ 2.580039] Freeing SMP alternatives memory: 32K [ 2.582653] smpboot: CPU0: Intel Xeon Processor (Skylake, IBRS) (family: 0x6, model: 0x55, stepping: 0x4) [ 2.586539] cblist_init_generic: Setting adjustable number of callback queues. [ 2.587252] cblist_init_generic: Setting shift to 1 and lim to 1. [ 2.588672] cblist_init_generic: Setting shift to 1 and lim to 1. [ 2.589639] cblist_init_generic: Setting shift to 1 and lim to 1. [ 2.590601] Running RCU-tasks wait API self tests [ 2.692724] Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. [ 2.694210] rcu: Hierarchical SRCU implementation. [ 2.694260] rcu: Max phase no-delay instances is 400. [ 2.699401] Callback from call_rcu_tasks_trace() invoked. [ 2.705102] NMI watchdog: Perf NMI watchdog permanently disabled [ 2.706709] smp: Bringing up secondary CPUs ... [ 2.710050] x86: Booting SMP configuration: [ 2.710284] .... node #0, CPUs: #1 [ 0.231243] smpboot: CPU 1 Converting physical 0 to logical die 1 [ 2.714885] smp: Brought up 1 node, 2 CPUs [ 2.715294] smpboot: Max logical packages: 2 [ 2.716260] smpboot: Total of 2 processors activated (8380.30 BogoMIPS) [ 2.721806] node 0 deferred pages initialised in 1ms [ 2.723700] pgdatinit0 (25) used greatest stack depth: 29432 bytes left [ 2.727291] devtmpfs: initialized [ 2.729778] x86/mm: Memory block size: 128MB [ 2.778793] DMA-API: preallocated 65536 debug entries [ 2.779258] DMA-API: debugging enabled by kernel config [ 2.780255] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns [ 2.781273] futex hash table entries: 512 (order: 4, 65536 bytes, linear) [ 2.783541] prandom: seed boundary self test passed [ 2.785824] prandom: 100 self tests passed [ 2.791038] prandom32: self test passed (less than 6 bits correlated) [ 2.791274] pinctrl core: initialized pinctrl subsystem [ 2.793690] [ 2.794112] ************************************************************* [ 2.794256] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 2.795254] ** ** [ 2.796293] ** IOMMU DebugFS SUPPORT HAS BEEN ENABLED IN THIS KERNEL ** [ 2.797256] ** ** [ 2.798255] ** This means that this kernel is built to expose internal ** [ 2.799252] ** IOMMU data structures, which may compromise security on ** [ 2.800254] ** your system. ** [ 2.801255] ** ** [ 2.802260] ** If you see this message and you are not debugging the ** [ 2.803254] ** kernel, report this immediately to your vendor! ** [ 2.804254] ** ** [ 2.805258] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 2.806254] ************************************************************* [ 2.807505] Callback from call_rcu_tasks_rude() invoked. [ 2.808572] PM: RTC time: 13:04:27, date: 2023-02-02 [ 2.817658] NET: Registered PF_NETLINK/PF_ROUTE protocol family [ 2.822125] DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations [ 2.822342] DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations [ 2.823340] DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations [ 2.824556] audit: initializing netlink subsys (disabled) [ 2.828134] audit: type=2000 audit(1675360255.467:1): state=initialized audit_enabled=0 res=1 [ 2.829241] thermal_sys: Registered thermal governor 'fair_share' [ 2.830261] thermal_sys: Registered thermal governor 'step_wise' [ 2.831273] thermal_sys: Registered thermal governor 'user_space' [ 2.832498] cpuidle: using governor menu [ 2.835033] HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB [ 2.835313] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 [ 2.838275] PCI: Using configuration type 1 for base access [ 2.911578] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. [ 2.916449] Callback from call_rcu_tasks() invoked. [ 2.929253] HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB [ 2.931296] HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages [ 2.933257] HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages [ 2.959300] cryptd: max_cpu_qlen set to 1000 [ 2.964693] ACPI: Added _OSI(Module Device) [ 2.966261] ACPI: Added _OSI(Processor Device) [ 2.968258] ACPI: Added _OSI(3.0 _SCP Extensions) [ 2.969255] ACPI: Added _OSI(Processor Aggregator Device) [ 2.971291] ACPI: Added _OSI(Linux-Dell-Video) [ 2.973271] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) [ 2.974267] ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) [ 3.059758] ACPI: 2 ACPI AML tables successfully acquired and loaded [ 3.086981] ACPI: Interpreter enabled [ 3.087510] ACPI: PM: (supports S0 S5) [ 3.088280] ACPI: Using IOAPIC for interrupt routing [ 3.089588] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 3.090253] PCI: Using E820 reservations for host bridge windows [ 3.094875] ACPI: Enabled 16 GPEs in block 00 to 0F [ 3.215998] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) [ 3.216307] acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI EDR HPX-Type3] [ 3.217255] acpi PNP0A03:00: _OSC: not requesting OS control; OS requires [ExtendedConfig ASPM ClockPM MSI] [ 3.218806] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. [ 3.237705] acpiphp: Slot [3] registered [ 3.238725] acpiphp: Slot [4] registered [ 3.239685] acpiphp: Slot [5] registered [ 3.240716] acpiphp: Slot [6] registered [ 3.241691] acpiphp: Slot [7] registered [ 3.242702] acpiphp: Slot [8] registered [ 3.243691] acpiphp: Slot [9] registered [ 3.244707] acpiphp: Slot [10] registered [ 3.245697] acpiphp: Slot [11] registered [ 3.246790] acpiphp: Slot [12] registered [ 3.247714] acpiphp: Slot [13] registered [ 3.248715] acpiphp: Slot [14] registered [ 3.249723] acpiphp: Slot [15] registered [ 3.250681] acpiphp: Slot [16] registered [ 3.251705] acpiphp: Slot [17] registered [ 3.252730] acpiphp: Slot [18] registered [ 3.253729] acpiphp: Slot [19] registered [ 3.254710] acpiphp: Slot [20] registered [ 3.255696] acpiphp: Slot [21] registered [ 3.256714] acpiphp: Slot [22] registered [ 3.257709] acpiphp: Slot [23] registered [ 3.258695] acpiphp: Slot [24] registered [ 3.259703] acpiphp: Slot [25] registered [ 3.260709] acpiphp: Slot [26] registered [ 3.261698] acpiphp: Slot [27] registered [ 3.262704] acpiphp: Slot [28] registered [ 3.263679] acpiphp: Slot [29] registered [ 3.264757] acpiphp: Slot [30] registered [ 3.265738] acpiphp: Slot [31] registered [ 3.266478] PCI host bridge to bus 0000:00 [ 3.267266] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [ 3.268261] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] [ 3.269265] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] [ 3.270262] pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] [ 3.271265] pci_bus 0000:00: root bus resource [bus 00-ff] [ 3.272780] pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 [ 3.275528] pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 [ 3.280833] pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 [ 3.286253] pci 0000:00:01.1: reg 0x20: [io 0xc0a0-0xc0af] [ 3.289296] pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] [ 3.290253] pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] [ 3.291253] pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] [ 3.292252] pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] [ 3.294536] pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 [ 3.300252] pci 0000:00:01.2: reg 0x20: [io 0xc040-0xc05f] [ 3.304628] pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 [ 3.306229] pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI [ 3.306270] pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB [ 3.310533] pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 [ 3.313251] pci 0000:00:03.0: reg 0x10: [io 0xc060-0xc07f] [ 3.316250] pci 0000:00:03.0: reg 0x14: [mem 0xfebc0000-0xfebc0fff] [ 3.327252] pci 0000:00:03.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] [ 3.331946] pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 [ 3.334252] pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] [ 3.337251] pci 0000:00:04.0: reg 0x14: [mem 0xfebc1000-0xfebc1fff] [ 3.351774] pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 [ 3.353252] pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] [ 3.377963] ACPI: PCI: Interrupt link LNKA configured for IRQ 10 [ 3.381549] ACPI: PCI: Interrupt link LNKB configured for IRQ 10 [ 3.385470] ACPI: PCI: Interrupt link LNKC configured for IRQ 11 [ 3.389519] ACPI: PCI: Interrupt link LNKD configured for IRQ 11 [ 3.391577] ACPI: PCI: Interrupt link LNKS configured for IRQ 9 [ 3.403500] iommu: Default domain type: Translated [ 3.404254] iommu: DMA domain TLB invalidation policy: lazy mode [ 3.408304] SCSI subsystem initialized [ 3.409847] ACPI: bus type USB registered [ 3.410759] usbcore: registered new interface driver usbfs [ 3.411509] usbcore: registered new interface driver hub [ 3.412450] usbcore: registered new device driver usb [ 3.414109] pps_core: LinuxPPS API ver. 1 registered [ 3.414252] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 3.415323] PTP clock support registered [ 3.417281] EDAC MC: Ver: 3.0.0 [ 3.424730] NetLabel: Initializing [ 3.425255] NetLabel: domain hash size = 128 [ 3.426241] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [ 3.427596] NetLabel: unlabeled traffic allowed by default [ 3.428256] PCI: Using ACPI for IRQ routing [ 3.430656] vgaarb: loaded [ 3.434173] clocksource: Switched to clocksource kvm-clock [ 3.919986] VFS: Disk quotas dquot_6.6.0 [ 3.921740] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 3.926352] pnp: PnP ACPI init [ 3.950062] pnp: PnP ACPI: found 5 devices [ 4.001239] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 4.003965] NET: Registered PF_INET protocol family [ 4.005981] IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) [ 4.011230] tcp_listen_portaddr_hash hash table entries: 2048 (order: 5, 163840 bytes, linear) [ 4.013512] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) [ 4.015327] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) [ 4.018561] TCP bind hash table entries: 32768 (order: 9, 2621440 bytes, linear) [ 4.024652] TCP: Hash tables configured (established 32768 bind 32768) [ 4.027968] MPTCP token hash table entries: 4096 (order: 6, 393216 bytes, linear) [ 4.030182] UDP hash table entries: 2048 (order: 6, 393216 bytes, linear) [ 4.032740] UDP-Lite hash table entries: 2048 (order: 6, 393216 bytes, linear) [ 4.035827] NET: Registered PF_UNIX/PF_LOCAL protocol family [ 4.037234] NET: Registered PF_XDP protocol family [ 4.038424] pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] [ 4.039897] pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] [ 4.041315] pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] [ 4.042887] pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] [ 4.045719] pci 0000:00:01.0: PIIX3: Enabling Passive Release [ 4.047161] pci 0000:00:00.0: Limiting direct PCI/PCI transfers [ 4.062831] ACPI: \_SB_.LNKD: Enabled at IRQ 11 [ 4.074540] pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x290 took 25273 usecs [ 4.076461] PCI: CLS 0 bytes, default 64 [ 4.077598] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [ 4.079134] software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) [ 4.082778] Trying to unpack rootfs image as initramfs... [ 4.092438] ACPI: bus type thunderbolt registered [ 4.094587] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x1e33052aadd, max_idle_ns: 440795310221 ns [ 4.113358] Initialise system trusted keyrings [ 4.115066] Key type blacklist registered [ 4.117432] workingset: timestamp_bits=36 max_order=20 bucket_order=0 [ 4.214294] zbud: loaded [ 4.235118] integrity: Platform Keyring initialized [ 4.246911] NET: Registered PF_ALG protocol family [ 4.248378] xor: automatically using best checksumming function avx [ 4.250126] Key type asymmetric registered [ 4.251187] Asymmetric key parser 'x509' registered [ 4.252449] Running certificate verification selftests [ 4.322474] cryptomgr_test (51) used greatest stack depth: 28232 bytes left [ 4.390237] cryptomgr_probe (50) used greatest stack depth: 28088 bytes left [ 4.393659] Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' [ 4.398593] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) [ 4.401041] io scheduler mq-deadline registered [ 4.402373] io scheduler kyber registered [ 4.404945] io scheduler bfq registered [ 4.411796] atomic64_test: passed for x86-64 platform with CX8 and with SSE [ 4.418471] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 [ 4.423030] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 [ 4.426717] ACPI: button: Power Button [PWRF] [ 4.458328] ACPI: \_SB_.LNKC: Enabled at IRQ 10 [ 4.460053] virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver [ 4.476230] virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver [ 4.496879] ACPI: \_SB_.LNKA: Enabled at IRQ 10 [ 4.498059] virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver [ 4.502113] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [ 4.505012] 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A [ 4.524093] Non-volatile memory driver v1.3 [ 4.531536] rdac: device handler registered [ 4.533215] hp_sw: device handler registered [ 4.534240] emc: device handler registered [ 4.535695] alua: device handler registered [ 4.539855] libphy: Fixed MDIO Bus: probed [ 4.541939] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver [ 4.543476] ehci-pci: EHCI PCI platform driver [ 4.544710] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver [ 4.546190] ohci-pci: OHCI PCI platform driver [ 4.547673] uhci_hcd: USB Universal Host Controller Interface driver [ 4.564183] uhci_hcd 0000:00:01.2: UHCI Host Controller [ 4.567822] uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 [ 4.569803] uhci_hcd 0000:00:01.2: detected 2 ports [ 4.571702] uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c040 [ 4.576286] usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 [ 4.579138] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 4.581485] usb usb1: Product: UHCI Host Controller [ 4.583158] usb usb1: Manufacturer: Linux 5.14.0-254.1844_765618331.el9.x86_64+debug uhci_hcd [ 4.585959] usb usb1: SerialNumber: 0000:00:01.2 [ 4.593621] hub 1-0:1.0: USB hub found [ 4.595400] hub 1-0:1.0: 2 ports detected [ 4.603503] usbcore: registered new interface driver usbserial_generic [ 4.607032] usbserial: USB Serial support registered for generic [ 4.609396] i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 [ 4.614287] serio: i8042 KBD port at 0x60,0x64 irq 1 [ 4.615653] serio: i8042 AUX port at 0x60,0x64 irq 12 [ 4.620121] mousedev: PS/2 mouse device common for all mice [ 4.625692] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 [ 4.633045] rtc_cmos 00:00: RTC can wake from S4 [ 4.639179] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 [ 4.644220] rtc_cmos 00:00: registered as rtc0 [ 4.645523] rtc_cmos 00:00: setting system clock to 2023-02-02T13:04:28 UTC (1675343068) [ 4.647939] rtc_cmos 00:00: alarms up to one day, 114 bytes nvram [ 4.649520] intel_pstate: CPU model not supported [ 4.655462] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 [ 4.662226] hid: raw HID events driver (C) Jiri Kosina [ 4.664436] usbcore: registered new interface driver usbhid [ 4.665693] usbhid: USB HID core driver [ 4.666809] drop_monitor: Initializing network drop monitor service [ 4.718020] Initializing XFRM netlink socket [ 4.723201] NET: Registered PF_INET6 protocol family [ 4.731609] Segment Routing with IPv6 [ 4.732899] NET: Registered PF_PACKET protocol family [ 4.734768] mpls_gso: MPLS GSO support [ 4.739601] No MBM correction factor available [ 4.740719] IPI shorthand broadcast: enabled [ 4.741983] AVX2 version of gcm_enc/dec engaged. [ 4.743368] AES CTR mode by8 optimization enabled [ 4.748452] sched_clock: Marking stable (4518012806, 230243857)->(4907072566, -158815903) [ 4.754578] registered taskstats version 1 [ 4.757571] Loading compiled-in X.509 certificates [ 4.763001] Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 792610c1c7eb3786fc55bec63b0c1aa63672d1e7' [ 4.769642] Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' [ 4.776053] Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' [ 4.787197] zswap: loaded using pool lzo/zbud [ 4.789562] cryptomgr_test (75) used greatest stack depth: 27920 bytes left [ 4.794876] debug_vm_pgtable: [debug_vm_pgtable ]: Validating architecture page table helpers [ 5.972080] page_owner is disabled [ 5.973858] Key type big_key registered [ 6.506399] Freeing initrd memory: 35908K [ 6.535748] modprobe (77) used greatest stack depth: 27272 bytes left [ 6.560759] Key type encrypted registered [ 6.562135] ima: No TPM chip found, activating TPM-bypass! [ 6.563461] Loading compiled-in module X.509 certificates [ 6.565969] Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 792610c1c7eb3786fc55bec63b0c1aa63672d1e7' [ 6.568543] ima: Allocated hash algorithm: sha256 [ 6.569905] ima: No architecture policies found [ 6.571453] evm: Initialising EVM extended attributes: [ 6.572667] evm: security.selinux [ 6.573445] evm: security.SMACK64 (disabled) [ 6.574434] evm: security.SMACK64EXEC (disabled) [ 6.575526] evm: security.SMACK64TRANSMUTE (disabled) [ 6.576687] evm: security.SMACK64MMAP (disabled) [ 6.577749] evm: security.apparmor (disabled) [ 6.578753] evm: security.ima [ 6.579453] evm: security.capability [ 6.580283] evm: HMAC attrs: 0x1 [ 7.183757] cryptomgr_test (190) used greatest stack depth: 27032 bytes left [ 7.369291] PM: Magic number: 11:16:78 [ 7.416862] Freeing unused decrypted memory: 2036K [ 7.425749] Freeing unused kernel image (initmem) memory: 5300K [ 7.427620] Write protecting the kernel read-only data: 57344k [ 7.437207] Freeing unused kernel image (text/rodata gap) memory: 2036K [ 7.442935] Freeing unused kernel image (rodata/data gap) memory: 1400K [ 7.519438] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 7.520860] x86/mm: Checking user space page tables [ 7.593534] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 7.601015] Run /init as init process [ 7.712575] systemd[1]: systemd 252-3.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [ 7.720683] systemd[1]: Detected virtualization kvm. [ 7.721473] systemd[1]: Detected architecture x86-64. [ 7.722189] systemd[1]: Running in initrd. Welcome to CentOS Stream 9 dracut-057-20.git20221213.el9 (Initramfs) ! [ 7.727230] systemd[1]: Hostname set to . [ 8.631545] systemd[1]: Queued start job for default target Initrd Default Target. [ 8.651625] systemd[1]: Created slice Slice /system/systemd-hibernate-resume. [ OK ] Created slice Slice /system/systemd-hibernate-resume . [ 8.657915] systemd[1]: Started Dispatch Password Requests to Console Directory Watch. [ OK ] Started Dispatch Password …ts to Console Directory Watch . [ 8.661242] systemd[1]: Reached target Initrd /usr File System. [ OK ] Reached target Initrd /usr File System . [ 8.663836] systemd[1]: Reached target Path Units. [ OK ] Reached target Path Units . [ 8.666162] systemd[1]: Reached target Slice Units. [ OK ] Reached target Slice Units . [ 8.668552] systemd[1]: Reached target Swaps. [ OK ] Reached target Swaps . [ 8.670916] systemd[1]: Reached target Timer Units. [ OK ] Reached target Timer Units . [ 8.676153] systemd[1]: Listening on D-Bus System Message Bus Socket. [ OK ] Listening on D-Bus System Message Bus Socket . [ 8.681467] systemd[1]: Listening on Journal Socket (/dev/log). [ OK ] Listening on Journal Socket (/dev/log) . [ 8.686768] systemd[1]: Listening on Journal Socket. [ OK ] Listening on Journal Socket . [ 8.692120] systemd[1]: Listening on udev Control Socket. [ OK ] Listening on udev Control Socket . [ 8.696595] systemd[1]: Listening on udev Kernel Socket. [ OK ] Listening on udev Kernel Socket . [ 8.699357] systemd[1]: Reached target Socket Units. [ OK ] Reached target Socket Units . [ 8.721157] systemd[1]: Starting Create List of Static Device Nodes... Starting Create List of Static Device Nodes ... [ 8.756822] systemd[1]: Starting Journal Service... Starting Journal Service ... [ 8.761676] systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. [ 8.797602] systemd[1]: Starting Apply Kernel Variables... Starting Apply Kernel Variables ... [ 8.819024] systemd[1]: Starting Create System Users... Starting Create System Users ... [ 8.869136] systemd[1]: Starting Setup Virtual Console... Starting Setup Virtual Console ... [ 8.938863] systemd[1]: Finished Create List of Static Device Nodes. [ OK ] Finished Create List of Static Device Nodes . [ 9.060003] systemd[1]: Finished Apply Kernel Variables. [ OK ] Finished Apply Kernel Variables . [ 9.203773] systemd[1]: Finished Create System Users. [ OK ] Finished Create System Users . [ 9.230121] systemd[1]: Starting Create Static Device Nodes in /dev... Starting Create Static Device Nodes in /dev ... [ 9.293500] systemd[1]: Started Journal Service. [ OK ] Started Journal Service . Starting Create Volatile Files and Directories ... [ OK ] Finished Create Static Device Nodes in /dev . [ OK ] Finished Create Volatile Files and Directories . [ OK ] Finished Setup Virtual Console . Starting dracut cmdline hook ... [ OK ] Finished dracut cmdline hook . Starting dracut pre-udev hook ... [ 11.637722] device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. [ 11.640899] device-mapper: uevent: version 1.0.3 [ 11.645399] device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com [ OK ] Finished dracut pre-udev hook . Starting Rule-based Manage…for Device Events and Files ... [ OK ] Started Rule-based Manager for Device Events and Files . Starting Coldplug All udev Devices ... [ * ] (1 of 3) A start job is running for…--06--guest28-root (5s / no limit) M [ OK ] Finished Coldplug All udev Devices . [ OK ] Reached target Network . Starting dracut initqueue hook ... [ 15.358571] virtio_blk virtio1: [vda] 106954752 512-byte logical blocks (54.8 GB/51.0 GiB) [ 15.581168] vda: vda1 vda2 [ 15.716369] virtio_net virtio0 ens3: renamed from eth0 [ 15.981425] scsi host0: ata_piix [ 16.005420] scsi host1: ata_piix [ 16.014718] ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0a0 irq 14 [ 16.016468] ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0a8 irq 15 [ 17.118192] cp (457) used greatest stack depth: 26312 bytes left [ OK ] Found device /dev/mapper/cs_kvm--06--guest28-root . [ OK ] Reached target Initrd Root Device . [ OK ] Found device /dev/mapper/cs_kvm--06--guest28-swap . Starting Resume from hiber…er/cs_kvm--06--guest28-swap ... [ OK ] Finished Resume from hiber…pper/cs_kvm--06--guest28-swap . [ OK ] Reached target Preparation for Local File Systems . [ OK ] Reached target Local File Systems . [ OK ] Reached target System Initialization . [ OK ] Reached target Basic System . [ OK ] Finished dracut initqueue hook . [ OK ] Reached target Preparation for Remote File Systems . [ OK ] Reached target Remote File Systems . Starting dracut pre-mount hook ... [ OK ] Finished dracut pre-mount hook . Starting File System Check…er/cs_kvm--06--guest28-root ... [ 18.940711] fsck (495) used greatest stack depth: 25384 bytes left [ OK ] Finished File System Check…pper/cs_kvm--06--guest28-root . Mounting /sysroot ... [ 20.167599] SGI XFS with ACLs, security attributes, scrub, verbose warnings, quota, no debug enabled [ 20.233499] XFS (dm-0): Mounting V5 Filesystem [ 20.259837] XFS (dm-0): Ending clean mount [ 20.275968] mount (497) used greatest stack depth: 25048 bytes left [ OK ] Mounted /sysroot . [ OK ] Reached target Initrd Root File System . Starting Mountpoints Configured in the Real Root ... [ 20.420967] systemd-fstab-g (509) used greatest stack depth: 24312 bytes left [ OK ] Finished Mountpoints Configured in the Real Root . [ OK ] Reached target Initrd File Systems . [ OK ] Reached target Initrd Default Target . Starting dracut pre-pivot and cleanup hook ... [ OK ] Finished dracut pre-pivot and cleanup hook . Starting Cleaning Up and Shutting Down Daemons ... [ OK ] Stopped target Network . [ OK ] Stopped target Timer Units . [ OK ] Closed D-Bus System Message Bus Socket . [ OK ] Stopped dracut pre-pivot and cleanup hook . [ OK ] Stopped target Initrd Default Target . [ OK ] Stopped target Basic System . [ OK ] Stopped target Initrd Root Device . [ OK ] Stopped target Initrd /usr File System . [ OK ] Stopped target Path Units . [ OK ] Stopped Dispatch Password …ts to Console Directory Watch . [ OK ] Stopped target Remote File Systems . [ OK ] Stopped target Preparation for Remote File Systems . [ OK ] Stopped target Slice Units . [ OK ] Stopped target Socket Units . [ OK ] Stopped target System Initialization . [ OK ] Stopped target Local File Systems . [ OK ] Stopped target Preparation for Local File Systems . [ OK ] Stopped target Swaps . [ OK ] Stopped dracut pre-mount hook . [ OK ] Stopped dracut initqueue hook . [ OK ] Stopped Apply Kernel Variables . [ OK ] Stopped Create Volatile Files and Directories . [ OK ] Stopped Coldplug All udev Devices . Stopping Rule-based Manage…for Device Events and Files ... [ OK ] Stopped Setup Virtual Console . [ OK ] Finished Cleaning Up and Shutting Down Daemons . [ OK ] Stopped Rule-based Manager for Device Events and Files . [ OK ] Closed udev Control Socket . [ OK ] Closed udev Kernel Socket . [ OK ] Stopped dracut pre-udev hook . [ OK ] Stopped dracut cmdline hook . Starting Cleanup udev Database ... [ OK ] Stopped Create Static Device Nodes in /dev . [ OK ] Stopped Create List of Static Device Nodes . [ OK ] Stopped Create System Users . [ OK ] Finished Cleanup udev Database . [ OK ] Reached target Switch Root . Starting Switch Root ... [ 21.916314] systemd-journald[233]: Received SIGTERM from PID 1 (systemd). [ 24.470815] SELinux: policy capability network_peer_controls=1 [ 24.478398] SELinux: policy capability open_perms=1 [ 24.479097] SELinux: policy capability extended_socket_class=1 [ 24.479961] SELinux: policy capability always_check_network=0 [ 24.480793] SELinux: policy capability cgroup_seclabel=1 [ 24.481564] SELinux: policy capability nnp_nosuid_transition=1 [ 24.482391] SELinux: policy capability genfs_seclabel_symlinks=1 [ 24.989144] audit: type=1403 audit(1675343088.842:2): auid=4294967295 ses=4294967295 lsm=selinux res=1 [ 25.017553] systemd[1]: Successfully loaded SELinux policy in 2.303366s. [ 25.070748] systemd[1]: RTC configured in localtime, applying delta of -300 minutes to system time. [ 25.308741] systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 201.799ms. [ 25.342953] systemd[1]: systemd 252-3.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [ 25.348088] systemd[1]: Detected virtualization kvm. [ 25.348966] systemd[1]: Detected architecture x86-64. Welcome to CentOS Stream 9 ! [ 25.965320] grep (552) used greatest stack depth: 24272 bytes left [ 25.973312] kdump-dep-gener (540) used greatest stack depth: 24088 bytes left [ 26.265825] systemd-rc-local-generator[557]: /etc/rc.d/rc.local is not marked executable, skipping. [ 26.920815] systemd[1]: /usr/lib/systemd/system/restraintd.service:8: Standard output type syslog+console is obsolete, automatically updating to journal+console. Please update your unit file, and consider removing the setting altogether. [ 27.245030] systemd[1]: initrd-switch-root.service: Deactivated successfully. [ 27.251559] systemd[1]: Stopped Switch Root. [ OK ] Stopped Switch Root . [ 27.260602] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 27.271069] systemd[1]: Created slice Slice /system/getty. [ OK ] Created slice Slice /system/getty . [ 27.282026] systemd[1]: Created slice Slice /system/modprobe. [ OK ] Created slice Slice /system/modprobe . [ 27.292227] systemd[1]: Created slice Slice /system/serial-getty. [ OK ] Created slice Slice /system/serial-getty . [ 27.306366] systemd[1]: Created slice Slice /system/sshd-keygen. [ OK ] Created slice Slice /system/sshd-keygen . [ 27.319341] systemd[1]: Created slice User and Session Slice. [ OK ] Created slice User and Session Slice . [ 27.324445] systemd[1]: Started Dispatch Password Requests to Console Directory Watch. [ OK ] Started Dispatch Password …ts to Console Directory Watch . [ 27.329584] systemd[1]: Started Forward Password Requests to Wall Directory Watch. [ OK ] Started Forward Password R…uests to Wall Directory Watch . [ 27.337685] systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. [ OK ] Set up automount Arbitrary…s File System Automount Point . [ 27.341396] systemd[1]: Reached target Local Encrypted Volumes. [ OK ] Reached target Local Encrypted Volumes . [ 27.344207] systemd[1]: Stopped target Switch Root. [ OK ] Stopped target Switch Root . [ 27.346673] systemd[1]: Stopped target Initrd File Systems. [ OK ] Stopped target Initrd File Systems . [ 27.349234] systemd[1]: Stopped target Initrd Root File System. [ OK ] Stopped target Initrd Root File System . [ 27.351946] systemd[1]: Reached target Local Integrity Protected Volumes. [ OK ] Reached target Local Integrity Protected Volumes . [ 27.354977] systemd[1]: Reached target Path Units. [ OK ] Reached target Path Units . [ 27.357367] systemd[1]: Reached target Slice Units. [ OK ] Reached target Slice Units . [ 27.359761] systemd[1]: Reached target System Time Set. [ OK ] Reached target System Time Set . [ 27.362187] systemd[1]: Reached target Local Verity Protected Volumes. [ OK ] Reached target Local Verity Protected Volumes . [ 27.369030] systemd[1]: Listening on Device-mapper event daemon FIFOs. [ OK ] Listening on Device-mapper event daemon FIFOs . [ 27.378403] systemd[1]: Listening on LVM2 poll daemon socket. [ OK ] Listening on LVM2 poll daemon socket . [ 27.524070] systemd[1]: Listening on RPCbind Server Activation Socket. [ OK ] Listening on RPCbind Server Activation Socket . [ 27.527985] systemd[1]: Reached target RPC Port Mapper. [ OK ] Reached target RPC Port Mapper . [ 27.545391] systemd[1]: Listening on Process Core Dump Socket. [ OK ] Listening on Process Core Dump Socket . [ 27.550567] systemd[1]: Listening on initctl Compatibility Named Pipe. [ OK ] Listening on initctl Compatibility Named Pipe . [ 27.570547] systemd[1]: Listening on udev Control Socket. [ OK ] Listening on udev Control Socket . [ 27.581547] systemd[1]: Listening on udev Kernel Socket. [ OK ] Listening on udev Kernel Socket . [ 27.612733] systemd[1]: Activating swap /dev/mapper/cs_kvm--06--guest28-swap... Activating swap /dev/mapper/cs_kvm--06--guest28-swap ... [ 27.646429] systemd[1]: Mounting Huge Pages File System... Mounting Huge Pages File System ... [ 27.677092] Adding 4145148k swap on /dev/mapper/cs_kvm--06--guest28-swap. Priority:-2 extents:1 across:4145148k FS [ 27.703470] systemd[1]: Mounting POSIX Message Queue File System... Mounting POSIX Message Queue File System ... [ 27.734802] systemd[1]: Mounting Kernel Debug File System... Mounting Kernel Debug File System ... [ 27.764738] systemd[1]: Mounting Kernel Trace File System... Mounting Kernel Trace File System ... [ 27.768798] systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). [ 27.807623] systemd[1]: Starting Create List of Static Device Nodes... Starting Create List of Static Device Nodes ... [ 27.845851] systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Starting Monitoring of LVM…meventd or progress polling ... [ 27.895905] systemd[1]: Starting Load Kernel Module configfs... Starting Load Kernel Module configfs ... [ 27.929005] systemd[1]: Starting Load Kernel Module drm... Starting Load Kernel Module drm ... [ 28.006599] systemd[1]: Starting Load Kernel Module fuse... Starting Load Kernel Module fuse ... [ 28.068701] systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Starting Read and set NIS …from /etc/sysconfig/network ... [ 28.091056] systemd[1]: systemd-fsck-root.service: Deactivated successfully. [ 28.093596] systemd[1]: Stopped File System Check on Root Device. [ OK ] Stopped File System Check on Root Device . [ 28.101359] systemd[1]: Stopped Journal Service. [ OK ] Stopped Journal Service . [ 28.223799] systemd[1]: Starting Journal Service... Starting Journal Service ... [ 28.238298] systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. [ 28.270829] fuse: init (API version 7.36) [ 28.298054] systemd[1]: Starting Generate network units from Kernel command line... Starting Generate network …ts from Kernel command line ... [ 28.358543] systemd[1]: Starting Remount Root and Kernel File Systems... Starting Remount Root and Kernel File Systems ... [ 28.387422] systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. [ 28.448231] ACPI: bus type drm_connector registered [ 28.463823] systemd[1]: Starting Apply Kernel Variables... Starting Apply Kernel Variables ... [ 28.534886] systemd[1]: Starting Coldplug All udev Devices... Starting Coldplug All udev Devices ... [ 28.656007] systemd[1]: Activated swap /dev/mapper/cs_kvm--06--guest28-swap. [ OK ] Activated swap /dev/mapper/cs_kvm--06--guest28-swap . [ 28.741240] systemd[1]: Started Journal Service. [ OK ] Started Journal Service . [ OK ] Mounted Huge Pages File System . [ OK ] Mounted POSIX Message Queue File System . [ OK ] Mounted Kernel Debug File System . [ OK ] Mounted Kernel Trace File System . [ OK ] Finished Create List of Static Device Nodes . [ OK ] Finished Monitoring of LVM… dmeventd or progress polling . [ OK ] Finished Load Kernel Module configfs . [ OK ] Finished Load Kernel Module drm . [ OK ] Finished Load Kernel Module fuse . [ OK ] Finished Read and set NIS …e from /etc/sysconfig/network . [ OK ] Finished Generate network units from Kernel command line . [ OK ] Finished Remount Root and Kernel File Systems . [ OK ] Finished Apply Kernel Variables . [ OK ] Reached target Preparation for Network . [ OK ] Reached target Swaps . Mounting FUSE Control File System ... Mounting Kernel Configuration File System ... Starting Flush Journal to Persistent Storage ... Starting Load/Save Random Seed ... Starting Create Static Device Nodes in /dev ... [ 29.394071] systemd-journald[577]: Received client request to flush runtime journal. [ OK ] Mounted FUSE Control File System . [ OK ] Mounted Kernel Configuration File System . [ OK ] Finished Flush Journal to Persistent Storage . [ OK ] Finished Load/Save Random Seed . [ OK ] Finished Create Static Device Nodes in /dev . [ OK ] Reached target Preparation for Local File Systems . Starting Rule-based Manage…for Device Events and Files ... [ OK ] Started Rule-based Manager for Device Events and Files . Starting Load Kernel Module configfs ... [ OK ] Finished Load Kernel Module configfs . [ OK ] Finished Coldplug All udev Devices . Mounting /boot ... [ 31.983032] XFS (vda1): Mounting V5 Filesystem [ 32.562125] XFS (vda1): Ending clean mount [ OK ] Mounted /boot . [ OK ] Reached target Local File Systems . Starting Automatic Boot Loader Update ... Starting Create Volatile Files and Directories ... [ OK ] Finished Automatic Boot Loader Update . [ 33.455976] input: PC Speaker as /devices/platform/pcspkr/input/input5 [ OK ] Finished Create Volatile Files and Directories . Mounting RPC Pipe File System ... Starting Security Auditing Service ... Starting RPC Bind ... [ 33.738068] piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 [ OK ] Started RPC Bind . [ 34.099124] mktemp (641) used greatest stack depth: 23368 bytes left [ 34.251648] RPC: Registered named UNIX socket transport module. [ 34.264297] RPC: Registered udp transport module. [ 34.264983] RPC: Registered tcp transport module. [ 34.265679] RPC: Registered tcp NFSv4.1 backchannel transport module. [ OK ] Mounted RPC Pipe File System . [ OK ] Reached target rpc_pipefs.target . [ OK ] Started /usr/sbin/lvm vgch…ation event cs_kvm-06-guest28 . [ OK ] Started Security Auditing Service . Starting Record System Boot/Shutdown in UTMP ... [ OK ] Finished Record System Boot/Shutdown in UTMP . [ OK ] Reached target System Initialization . [ OK ] Started dnf makecache --timer . [ OK ] Started Daily Cleanup of Temporary Directories . [ OK ] Listening on D-Bus System Message Bus Socket . [ OK ] Listening on SSSD Kerberos…ache Manager responder socket . [ OK ] Reached target Socket Units . [ OK ] Reached target Basic System . Starting Network Manager ... Starting NTP client/server ... Starting Restore /run/initramfs on shutdown ... [ OK ] Started irqbalance daemon . Starting System Logging Service ... [ OK ] Reached target sshd-keygen.target . [ OK ] Reached target User and Group Name Lookups . [-- MARK -- Thu Feb 2 18:05:00 2023] Starting User Login Management ... [ OK ] Started System Logging Service . [ OK ] Finished Restore /run/initramfs on shutdown . Starting D-Bus System Message Bus ... [ OK ] Started NTP client/server . Starting Wait for chrony to synchronize system clock ... [ OK ] Started D-Bus System Message Bus . [ OK ] Started Network Manager . [ OK ] Reached target Network . Starting Network Manager Wait Online ... Starting GSSAPI Proxy Daemon ... Starting OpenSSH server daemon ... Starting Hostname Service ... [ OK ] Started GSSAPI Proxy Daemon . [ OK ] Started User Login Management . [ OK ] Started OpenSSH server daemon . [ OK ] Created slice User Slice of UID 0 . [ OK ] Reached target NFS client services . [ OK ] Reached target Preparation for Remote File Systems . [ OK ] Reached target Remote File Systems . Starting Permit User Sessions ... Starting User Runtime Directory /run/user/0 ... [ OK ] Finished User Runtime Directory /run/user/0 . Starting User Manager for UID 0 ... [ OK ] Finished Permit User Sessions . [ OK ] Started Getty on tty1 . [ OK ] Started Serial Getty on ttyS0 . [ OK ] Reached target Login Prompts . [ OK ] Started Hostname Service . [ OK ] Listening on Load/Save RF …itch Status /dev/rfkill Watch . Starting Network Manager Script Dispatcher Service ... [ OK ] Started Network Manager Script Dispatcher Service . [ OK ] Finished Network Manager Wait Online . [ OK ] Reached target Network is Online . [ OK ] Started Anaconda Monitorin…ost-boot notification program . Starting Crash recovery kernel arming ... Starting Notify NFS peers of a restart ... [ OK ] Started Notify NFS peers of a restart . [ OK ] Started User Manager for UID 0 . CentOS Stream 9 Kernel 5.14.0-254.1844_765618331.el9.x86_64+debug on an x86_64 kvm-06-guest28 login: [ 52.584717] restraintd[1198]: * Fetching recipe: http://lab-02.hosts.prod.psi.bos.redhat.com:8000//recipes/13327125/ [ 52.753726] restraintd[1198]: * Parsing recipe [ 52.783775] restraintd[1198]: * Running recipe [ 52.786319] restraintd[1198]: ** Continuing task: 155711322 [/mnt/tests/github.com/beaker-project/beaker-core-tasks/archive/master.tar.gz/reservesys] [ 52.803547] restraintd[1198]: ** Preparing metadata [ 52.931911] restraintd[1198]: ** Refreshing peer role hostnames: Retries 0 [ 53.064278] restraintd[1198]: ** Updating env vars [ 53.066269] restraintd[1198]: *** Current Time: Thu Feb 02 13:05:17 2023 Localwatchdog at: * Disabled! * [ 53.104922] restraintd[1198]: ** Running task: 155711322 [/distribution/reservesys] [ 56.321897] Running test [R:13327125 T:155711322 - /distribution/reservesys - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [ 62.004047] Running test [R:13327125 T:5 - Boot test - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [ 171.122521] sync (5091) used greatest stack depth: 22776 bytes left [ 174.042077] PKCS7: Message signed outside of X.509 validity window [ 175.648586] Running test [R:13327125 T:6 - /kernel/kdump/setup-nfsdump - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] Stopping Session 2 of User root ... [ OK ] Removed slice Slice /system/modprobe . [ OK ] Removed slice Slice /system/sshd-keygen . [ OK ] Removed slice Slice /system/systemd-hibernate-resume . [ OK ] Stopped target Multi-User System . [ OK ] Stopped target Login Prompts . [ OK ] Stopped target rpc_pipefs.target . [ OK ] Stopped target RPC Port Mapper . [ OK ] Stopped target Timer Units . [ OK ] Stopped dnf makecache --timer . [ OK ] Stopped Daily rotation of log files . [ OK ] Stopped Daily Cleanup of Temporary Directories . [ OK ] Closed LVM2 poll daemon socket . [ OK ] Closed Process Core Dump Socket . [ OK ] Closed Load/Save RF Kill Switch Status /dev/rfkill Watch . Unmounting RPC Pipe File System ... Stopping Command Scheduler ... Stopping Restore /run/initramfs on shutdown ... Stopping Getty on tty1 ... Stopping irqbalance daemon ... Stopping Postfix Mail Transport Agent ... Stopping The restraint harness. ... Stopping System Logging Service ... Stopping Serial Getty on ttyS0 ... Stopping OpenSSH server daemon ... Stopping Hostname Service ... Stopping Load/Save Random Seed ... [ OK ] Stopped irqbalance daemon . [ OK ] Stopped Getty on tty1 . [ OK ] Stopped Serial Getty on ttyS0 . [ OK ] Stopped Command Scheduler . [ OK ] Stopped The restraint harness. . [ OK ] Stopped System Logging Service . [ OK ] Stopped Session 2 of User root . [ OK ] Removed slice Slice /system/getty . [ OK ] Removed slice Slice /system/serial-getty . [ OK ] Stopped target Network is Online . [ OK ] Stopped target System Time Synchronized . [ OK ] Stopped target System Time Set . [ OK ] Stopped Network Manager Wait Online . [ OK ] Stopped Wait for chrony to synchronize system clock . Stopping NTP client/server ... Stopping User Login Management ... Stopping Permit User Sessions ... Stopping User Manager for UID 0 ... [ OK ] Stopped OpenSSH server daemon . [ OK ] Stopped Hostname Service . [ OK ] Stopped NTP client/server . [ OK ] Stopped User Manager for UID 0 . [ OK ] Unmounted RPC Pipe File System . [ OK ] Stopped User Login Management . [ OK ] Stopped target sshd-keygen.target . [ 196.709240] vda1: Can't mount, would change RO state Stopping User Runtime Directory /run/user/0 ... [ OK ] Stopped Load/Save Random Seed . [ OK ] Stopped Permit User Sessions . [ OK ] Stopped target User and Group Name Lookups . [ OK ] Stopped target Remote File Systems . [ OK ] Stopped target Preparation for Remote File Systems . [ OK ] Stopped target NFS client services . Stopping GSSAPI Proxy Daemon ... [ OK ] Unmounted /run/user/0 . [ OK ] Stopped GSSAPI Proxy Daemon . [ OK ] Stopped User Runtime Directory /run/user/0 . [ OK ] Removed slice User Slice of UID 0 . [ OK ] Stopped Postfix Mail Transport Agent . [ OK ] Stopped target Network . Stopping Network Manager ... [ OK ] Stopped Network Manager . [ OK ] Stopped target Preparation for Network . [ OK ] Stopped Generate network units from Kernel command line . [ * * * ] A stop job is running for Restore /…tramfs on shutdown (5s / no limit) M [ * * * ] A stop job is running for Restore /…tramfs on shutdown (6s / no limit) M [ * * * ] A stop job is running for Restore /…tramfs on shutdown (6s / no limit) M [ * * ] A stop job is running for Restore /…tramfs on shutdown (7s / no limit) M [ * ] A stop job is running for Restore /…tramfs on shutdown (7s / no limit) M [ * * ] A stop job is running for Restore /…tramfs on shutdown (8s / no limit) M [ * * * ] A stop job is running for Restore /…tramfs on shutdown (8s / no limit) M [ * * * ] A stop job is running for Restore /…tramfs on shutdown (9s / no limit) M [ * * * ] A stop job is running for Restore /…tramfs on shutdown (9s / no limit) M [ * * * ] A stop job is running for Restore /…ramfs on shutdown (10s / no limit) M [ * * ] A stop job is running for Restore /…ramfs on shutdown (10s / no limit) M [ * ] A stop job is running for Restore /…ramfs on shutdown (11s / no limit) M [ * * ] A stop job is running for Restore /…ramfs on shutdown (11s / no limit) M [ OK ] Stopped Restore /run/initramfs on shutdown . [ OK ] Stopped target Basic System . [ OK ] Stopped target Path Units . [ OK ] Stopped target Slice Units . [ OK ] Removed slice User and Session Slice . [ OK ] Stopped target Socket Units . [ OK ] Closed SSSD Kerberos Cache Manager responder socket . Stopping D-Bus System Message Bus ... [ OK ] Stopped D-Bus System Message Bus . [ OK ] Closed D-Bus System Message Bus Socket . [ OK ] Stopped target System Initialization . [ OK ] Unset automount Arbitrary …s File System Automount Point . [ OK ] Stopped target Local Encrypted Volumes . [ OK ] Stopped Dispatch Password …ts to Console Directory Watch . [ OK ] Stopped Forward Password R…uests to Wall Directory Watch . [ OK ] Stopped target Local Integrity Protected Volumes . [ OK ] Stopped target Swaps . [ OK ] Stopped target Local Verity Protected Volumes . Deactivating swap /dev/cs_kvm-06-guest28/swap ... [ OK ] Stopped Read and set NIS d…e from /etc/sysconfig/network . [ OK ] Stopped Automatic Boot Loader Update . [ OK ] Stopped Apply Kernel Variables . Stopping Record System Boot/Shutdown in UTMP ... [ OK ] Unmounted /run/credentials/systemd-sysctl.service . [ OK ] Deactivated swap /dev/cs_kvm-06-guest28/swap . [ OK ] Deactivated swap /dev/disk…2-d2bd-4384-8ed0-da106b338941 . [ OK ] Deactivated swap /dev/disk…name-cs_kvm--06--guest28-swap . [ OK ] Deactivated swap /dev/disk…qv4LuEPs8R7jOjKFiM8MUF3pOegff . [ OK ] Deactivated swap /dev/dm-1 . [ OK ] Deactivated swap /dev/mapper/cs_kvm--06--guest28-swap . [ OK ] Stopped Record System Boot/Shutdown in UTMP . Stopping Security Auditing Service ... [ 207.738030] auditd (638) used greatest stack depth: 22672 bytes left [ 207.744852] audit: type=1305 audit(1675361272.090:125): op=set audit_pid=0 old=637 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 [ OK ] Stopped Security Auditing Service . [ 207.791151] audit: type=1131 audit(1675361272.138:126): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=auditd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Stopped Create Volatile Files and Directories . [ 207.815018] audit: type=1131 audit(1675361272.163:127): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Stopped target Local File Systems . Unmounting /boot ... Unmounting /run/credential…temd-tmpfiles-setup.service ... Unmounting /run/credential…-tmpfiles-setup-dev.service ... [ OK ] Unmounted /run/credentials…ystemd-tmpfiles-setup.service . [ OK ] Unmounted /run/credentials…md-tmpfiles-setup-dev.service . [ 208.267369] XFS (vda1): Unmounting Filesystem [ OK ] Unmounted /boot . [ OK ] Stopped target Preparation for Local File Systems . [ OK ] Reached target Unmount All Filesystems . Stopping Monitoring of LVM…meventd or progress polling ... [ OK ] Stopped Remount Root and Kernel File Systems . [ 208.410303] audit: type=1131 audit(1675361272.758:128): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Stopped Create Static Device Nodes in /dev . [ 208.419021] audit: type=1131 audit(1675361272.767:129): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Stopped Monitoring of LVM2… dmeventd or progress polling . [ 208.627010] audit: type=1131 audit(1675361272.975:130): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=lvm2-monitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Reached target System Shutdown . [ OK ] Reached target Late Shutdown Services . [ OK ] Finished System Reboot . [ 208.644731] audit: type=1130 audit(1675361272.992:131): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-reboot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Reached targ[ 208.649251] audit: type=1131 audit(1675361272.993:132): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-reboot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' et System Reboot . [ 208.669785] audit: type=1334 audit(1675361273.018:133): prog-id=0 op=UNLOAD [ 208.671257] audit: type=1334 audit(1675361273.019:134): prog-id=0 op=UNLOAD [ 208.895304] systemd-shutdown[1]: Syncing filesystems and block devices. [ 208.912884] systemd-shutdown[1]: Sending SIGTERM to remaining processes... [ 208.957463] systemd-journald[577]: Received SIGTERM from PID 1 (systemd-shutdow). [ 209.044004] systemd-shutdown[1]: Sending SIGKILL to remaining processes... [ 209.111234] systemd-shutdown[1]: Unmounting file systems. [ 209.132154] [6223]: Remounting '/' read-only with options 'seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota'. [ 209.405476] systemd-shutdown[1]: All filesystems unmounted. [ 209.406439] systemd-shutdown[1]: Deactivating swaps. [ 209.408020] systemd-shutdown[1]: All swaps deactivated. [ 209.409142] systemd-shutdown[1]: Detaching loop devices. [ 209.411820] systemd-shutdown[1]: All loop devices detached. [ 209.412794] systemd-shutdown[1]: Stopping MD devices. [ 209.414955] systemd-shutdown[1]: All MD devices stopped. [ 209.415824] systemd-shutdown[1]: Detaching DM devices. [ 209.427895] systemd-shutdown[1]: Detaching DM /dev/dm-1 (253:1). [ 209.469475] systemd-shutdown[1]: Not all DM devices detached, 1 left. [ 209.471427] systemd-shutdown[1]: Detaching DM devices. [ 209.476740] systemd-shutdown[1]: Not all DM devices detached, 1 left. [ 209.477784] systemd-shutdown[1]: Cannot finalize remaining DM devices, continuing. [ 209.508197] systemd-shutdown[1]: Successfully changed into root pivot. [ 209.509350] systemd-shutdown[1]: Returning to initrd... [ 210.221830] dracut Warning: Killing all remaining processes dracut Warning: Killing all remaining processes [ 211.328288] XFS (dm-0): Unmounting Filesystem [ 211.675948] dracut Warning: Unmounted /oldroot. dracut Warning: Unmounted /oldroot. [ 211.817468] dracut: Disassembling device-mapper devices Rebooting. [ 212.103924] reboot: Restarting system [ 212.104663] reboot: machine restart [?25l Use the ^ and v keys to change the selection. Press 'e' to edit the selected item, or 'c' for a command prompt. CentOS Stream (5.14.0-254.1844_765618331.el9.x86_64+debug) 9 with debugg> CentOS Stream (5.14.0-247.el9.x86_64) 9 CentOS Stream (0-rescue-d5d3542be8d8469cb02596ae71801d53) 9 The selected entry will be started automatically in 5s. The selected entry will be started automatically in 4s. The selected entry will be started automatically in 3s. The selected entry will be started automatically in 2s. The selected entry will be started automatically in 1s. The selected entry will be started automatically in 0s. [ 0.000000] [ 0.000000] The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. [ 0.000000] Command line: BOOT_IMAGE=(hd0,msdos1)/vmlinuz-5.14.0-254.1844_765618331.el9.x86_64+debug root=/dev/mapper/cs_kvm--06--guest28-root ro resume=/dev/mapper/cs_kvm--06--guest28-swap rd.lvm.lv=cs_kvm-06-guest28/root rd.lvm.lv=cs_kvm-06-guest28/swap console=ttyS0,115200 crashkernel=1G-2G:384M,2G-3G:512M,3G-4G:768M,4G-16G:1G,16G-64G:2G,64G-128G:2G,128G-:4G [ 0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' [ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 0.000000] x86/fpu: xstate_offset[3]: 960, xstate_sizes[3]: 64 [ 0.000000] x86/fpu: xstate_offset[4]: 1024, xstate_sizes[4]: 64 [ 0.000000] x86/fpu: xstate_offset[5]: 1088, xstate_sizes[5]: 64 [ 0.000000] x86/fpu: xstate_offset[6]: 1152, xstate_sizes[6]: 512 [ 0.000000] x86/fpu: xstate_offset[7]: 1664, xstate_sizes[7]: 1024 [ 0.000000] x86/fpu: xstate_offset[9]: 2688, xstate_sizes[9]: 8 [ 0.000000] x86/fpu: Enabled xstate features 0x2ff, context size is 2696 bytes, using 'standard' format. [ 0.000000] signal: max sigframe size: 3632 [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable [ 0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000bfff9fff] usable [ 0.000000] BIOS-e820: [mem 0x00000000bfffa000-0x00000000bfffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] SMBIOS 2.4 present. [ 0.000000] DMI: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 0.000000] Hypervisor detected: KVM [ 0.000000] kvm-clock: Using msrs 4b564d01 and 4b564d00 [ 0.000010] kvm-clock: using sched offset of 2601591668172840 cycles [ 0.000023] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns [ 0.000059] tsc: Detected 2095.076 MHz processor [ 0.000899] last_pfn = 0x140000 max_arch_pfn = 0x400000000 [ 0.000988] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 0.001021] last_pfn = 0xbfffa max_arch_pfn = 0x400000000 [ 0.015944] found SMP MP-table at [mem 0x000f6390-0x000f639f] [ 0.016089] Using GB pages for direct mapping [ 0.017652] RAMDISK: [mem 0x339ce000-0x35cdefff] [ 0.017702] ACPI: Early table checksum verification disabled [ 0.017756] ACPI: RSDP 0x00000000000F61A0 000014 (v00 BOCHS ) [ 0.017790] ACPI: RSDT 0x00000000BFFFFB40 000030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) [ 0.017829] ACPI: FACP 0x00000000BFFFF177 000074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) [ 0.017860] ACPI: DSDT 0x00000000BFFFE040 001137 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) [ 0.017878] ACPI: FACS 0x00000000BFFFE000 000040 [ 0.017895] ACPI: SSDT 0x00000000BFFFF1EB 0008D5 (v01 BOCHS BXPCSSDT 00000001 BXPC 00000001) [ 0.017912] ACPI: APIC 0x00000000BFFFFAC0 000080 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) [ 0.017927] ACPI: Reserving FACP table memory at [mem 0xbffff177-0xbffff1ea] [ 0.017933] ACPI: Reserving DSDT table memory at [mem 0xbfffe040-0xbffff176] [ 0.017938] ACPI: Reserving FACS table memory at [mem 0xbfffe000-0xbfffe03f] [ 0.017942] ACPI: Reserving SSDT table memory at [mem 0xbffff1eb-0xbffffabf] [ 0.017947] ACPI: Reserving APIC table memory at [mem 0xbffffac0-0xbffffb3f] [ 0.018707] No NUMA configuration found [ 0.018718] Faking a node at [mem 0x0000000000000000-0x000000013fffffff] [ 0.018744] NODE_DATA(0) allocated [mem 0x13ffd3000-0x13fffdfff] [ 0.019762] Reserving 1024MB of memory at 1184MB for crashkernel (System RAM: 4095MB) [ 0.081561] Zone ranges: [ 0.081570] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.081580] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 0.081588] Normal [mem 0x0000000100000000-0x000000013fffffff] [ 0.081596] Device empty [ 0.081603] Movable zone start for each node [ 0.081609] Early memory node ranges [ 0.081612] node 0: [mem 0x0000000000001000-0x000000000009efff] [ 0.081617] node 0: [mem 0x0000000000100000-0x00000000bfff9fff] [ 0.081623] node 0: [mem 0x0000000100000000-0x000000013fffffff] [ 0.081634] Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] [ 0.081657] On node 0, zone DMA: 1 pages in unavailable ranges [ 0.081906] On node 0, zone DMA: 97 pages in unavailable ranges [ 0.134766] On node 0, zone Normal: 6 pages in unavailable ranges [ 0.948802] kasan: KernelAddressSanitizer initialized [ 0.956417] ACPI: PM-Timer IO Port: 0x608 [ 0.956491] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) [ 0.956592] IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 [ 0.956619] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) [ 0.956627] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) [ 0.956632] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 0.956648] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) [ 0.956653] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) [ 0.956670] ACPI: Using ACPI (MADT) for SMP configuration information [ 0.956687] TSC deadline timer available [ 0.956697] smpboot: Allowing 2 CPUs, 0 hotplug CPUs [ 0.956889] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 0.956903] PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] [ 0.956911] PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] [ 0.956915] PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] [ 0.956923] PM: hibernation: Registered nosave memory: [mem 0xbfffa000-0xbfffffff] [ 0.956928] PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] [ 0.956932] PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] [ 0.956936] PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] [ 0.956940] PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] [ 0.956957] [mem 0xc0000000-0xfeffbfff] available for PCI devices [ 0.956962] Booting paravirtualized kernel on KVM [ 0.956990] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns [ 0.980651] setup_percpu: NR_CPUS:8192 nr_cpumask_bits:2 nr_cpu_ids:2 nr_node_ids:1 [ 0.991388] percpu: Embedded 515 pages/cpu s2072576 r8192 d28672 u4194304 [ 0.991678] kvm-guest: PV spinlocks enabled [ 0.991703] PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) [ 0.991767] Fallback order for Node 0: 0 [ 0.991802] Built 1 zonelists, mobility grouping on. Total pages: 1031930 [ 0.991808] Policy zone: Normal [ 0.991815] Kernel command line: BOOT_IMAGE=(hd0,msdos1)/vmlinuz-5.14.0-254.1844_765618331.el9.x86_64+debug root=/dev/mapper/cs_kvm--06--guest28-root ro resume=/dev/mapper/cs_kvm--06--guest28-swap rd.lvm.lv=cs_kvm-06-guest28/root rd.lvm.lv=cs_kvm-06-guest28/swap console=ttyS0,115200 crashkernel=1G-2G:384M,2G-3G:512M,3G-4G:768M,4G-16G:1G,16G-64G:2G,64G-128G:2G,128G-:4G [ 0.992467] Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/vmlinuz-5.14.0-254.1844_765618331.el9.x86_64+debug", will be passed to user space. [ 0.996568] Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) [ 0.997284] Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) [ 0.997480] mem auto-init: stack:off, heap alloc:off, heap free:off [ 0.997491] Stack Depot early init allocating hash table with memblock_alloc, 8388608 bytes [ 1.005698] software IO TLB: area num 2. [ 2.237813] Memory: 2000480K/4193888K available (38920K kernel code, 13007K rwdata, 14984K rodata, 5300K init, 42020K bss, 2142324K reserved, 0K cma-reserved) [ 2.237880] random: get_random_u64 called from kmem_cache_open+0x22/0x380 with crng_init=0 [ 2.240936] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 [ 2.240953] kmemleak: Kernel memory leak detector disabled [ 2.244856] Kernel/User page tables isolation: enabled [ 2.245210] ftrace: allocating 45745 entries in 179 pages [ 2.303626] ftrace: allocated 179 pages with 5 groups [ 2.308613] Dynamic Preempt: voluntary [ 2.309202] Running RCU self tests [ 2.309244] rcu: Preemptible hierarchical RCU implementation. [ 2.309252] rcu: RCU lockdep checking is enabled. [ 2.309261] rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=2. [ 2.309268] rcu: RCU callback double-/use-after-free debug is enabled. [ 2.309272] Trampoline variant of Tasks RCU enabled. [ 2.309275] Rude variant of Tasks RCU enabled. [ 2.309278] Tracing variant of Tasks RCU enabled. [ 2.309282] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. [ 2.309287] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 [ 2.333283] NR_IRQS: 524544, nr_irqs: 440, preallocated irqs: 16 [ 2.334044] rcu: srcu_init: Setting srcu_struct sizes based on contention. [ 2.334117] random: crng init done (trusting CPU's manufacturer) [ 2.334685] Console: colour *CGA 80x25 [ 2.541775] printk: console [ttyS0] enabled [ 2.542726] Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar [ 2.544456] ... MAX_LOCKDEP_SUBCLASSES: 8 [ 2.545393] ... MAX_LOCK_DEPTH: 48 [ 2.546341] ... MAX_LOCKDEP_KEYS: 8192 [ 2.547325] ... CLASSHASH_SIZE: 4096 [ 2.548305] ... MAX_LOCKDEP_ENTRIES: 65536 [ 2.549316] ... MAX_LOCKDEP_CHAINS: 131072 [ 2.550346] ... CHAINHASH_SIZE: 65536 [ 2.551349] memory used by lock dependency info: 11641 kB [ 2.552577] memory used for stack traces: 4224 kB [ 2.553646] per task-struct memory footprint: 2688 bytes [ 2.555053] ACPI: Core revision 20211217 [ 2.556878] APIC: Switch to symmetric I/O mode setup [ 2.558468] x2apic enabled [ 2.559565] Switched APIC routing to physical x2apic. [ 2.563163] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 [ 2.564734] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x1e33052aadd, max_idle_ns: 440795310221 ns [ 2.567369] Calibrating delay loop (skipped) preset value.. 4190.15 BogoMIPS (lpj=2095076) [ 2.569329] pid_max: default: 32768 minimum: 301 [ 2.571642] LSM: Security Framework initializing [ 2.572466] Yama: becoming mindful. [ 2.573417] SELinux: Initializing. [ 2.574643] LSM support for eBPF active [ 2.576778] Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) [ 2.578404] Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) [ 2.585189] Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 [ 2.586331] Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 [ 2.587350] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 2.589334] Spectre V2 : Mitigation: IBRS [ 2.590332] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch [ 2.592331] Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT [ 2.594337] RETBleed: Mitigation: IBRS [ 2.596354] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier [ 2.599339] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl [ 2.602382] MDS: Mitigation: Clear CPU buffers [ 2.603339] TAA: Mitigation: Clear CPU buffers [ 2.604340] MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode [ 2.656784] Freeing SMP alternatives memory: 32K [ 2.659203] smpboot: CPU0: Intel Xeon Processor (Skylake, IBRS) (family: 0x6, model: 0x55, stepping: 0x4) [ 2.662693] cblist_init_generic: Setting adjustable number of callback queues. [ 2.663335] cblist_init_generic: Setting shift to 1 and lim to 1. [ 2.664748] cblist_init_generic: Setting shift to 1 and lim to 1. [ 2.665735] cblist_init_generic: Setting shift to 1 and lim to 1. [ 2.666691] Running RCU-tasks wait API self tests [ 2.768708] Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. [ 2.770020] rcu: Hierarchical SRCU implementation. [ 2.770340] rcu: Max phase no-delay instances is 400. [ 2.775435] Callback from call_rcu_tasks_trace() invoked. [ 2.778215] NMI watchdog: Perf NMI watchdog permanently disabled [ 2.779351] smp: Bringing up secondary CPUs ... [ 2.782998] x86: Booting SMP configuration: [ 2.783368] .... node #0, CPUs: #1 [ 0.227267] smpboot: CPU 1 Converting physical 0 to logical die 1 [ 2.787997] smp: Brought up 1 node, 2 CPUs [ 2.788363] smpboot: Max logical packages: 2 [ 2.789339] smpboot: Total of 2 processors activated (8380.30 BogoMIPS) [ 2.816325] node 0 deferred pages initialised in 24ms [ 2.818679] pgdatinit0 (25) used greatest stack depth: 29432 bytes left [ 2.821693] devtmpfs: initialized [ 2.823904] x86/mm: Memory block size: 128MB [ 2.871427] DMA-API: preallocated 65536 debug entries [ 2.872382] DMA-API: debugging enabled by kernel config [ 2.873340] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns [ 2.874890] futex hash table entries: 512 (order: 4, 65536 bytes, linear) [ 2.877356] Callback from call_rcu_tasks_rude() invoked. [ 2.878772] prandom: seed boundary self test passed [ 2.882358] prandom: 100 self tests passed [ 2.891467] prandom32: self test passed (less than 6 bits correlated) [ 2.893378] pinctrl core: initialized pinctrl subsystem [ 2.897386] [ 2.897922] ************************************************************* [ 2.899348] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 2.901347] ** ** [ 2.903363] ** IOMMU DebugFS SUPPORT HAS BEEN ENABLED IN THIS KERNEL ** [ 2.905347] ** ** [ 2.908350] ** This means that this kernel is built to expose internal ** [ 2.910344] ** IOMMU data structures, which may compromise security on ** [ 2.912347] ** your system. ** [ 2.914346] ** ** [ 2.916345] ** If you see this message and you are not debugging the ** [ 2.917342] ** kernel, report this immediately to your vendor! ** [ 2.919346] ** ** [ 2.921347] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 2.923356] ************************************************************* [ 2.925682] PM: RTC time: 13:08:33, date: 2023-02-02 [ 2.937604] NET: Registered PF_NETLINK/PF_ROUTE protocol family [ 2.944162] DMA: preallocated 256 KiB GFP_KERNEL pool for atomic allocations [ 2.946419] DMA: preallocated 256 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations [ 2.947432] DMA: preallocated 256 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations [ 2.949668] audit: initializing netlink subsys (disabled) [ 2.952449] audit: type=2000 audit(1675360502.671:1): state=initialized audit_enabled=0 res=1 [ 2.953325] thermal_sys: Registered thermal governor 'fair_share' [ 2.953325] thermal_sys: Registered thermal governor 'step_wise' [ 2.954341] thermal_sys: Registered thermal governor 'user_space' [ 2.955555] cpuidle: using governor menu [ 2.958948] HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB [ 2.960379] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 [ 2.963189] PCI: Using configuration type 1 for base access [ 2.976565] Callback from call_rcu_tasks() invoked. [ 3.052482] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. [ 3.071338] HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB [ 3.073388] HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages [ 3.075346] HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages [ 3.106609] cryptd: max_cpu_qlen set to 1000 [ 3.111325] ACPI: Added _OSI(Module Device) [ 3.112355] ACPI: Added _OSI(Processor Device) [ 3.114343] ACPI: Added _OSI(3.0 _SCP Extensions) [ 3.115340] ACPI: Added _OSI(Processor Aggregator Device) [ 3.116371] ACPI: Added _OSI(Linux-Dell-Video) [ 3.117354] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) [ 3.119359] ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) [ 3.219513] ACPI: 2 ACPI AML tables successfully acquired and loaded [ 3.246744] ACPI: Interpreter enabled [ 3.247619] ACPI: PM: (supports S0 S5) [ 3.248366] ACPI: Using IOAPIC for interrupt routing [ 3.250653] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 3.252340] PCI: Using E820 reservations for host bridge windows [ 3.258325] ACPI: Enabled 16 GPEs in block 00 to 0F [ 3.374317] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) [ 3.375389] acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI EDR HPX-Type3] [ 3.377340] acpi PNP0A03:00: _OSC: not requesting OS control; OS requires [ExtendedConfig ASPM ClockPM MSI] [ 3.379876] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. [ 3.399887] acpiphp: Slot [3] registered [ 3.401811] acpiphp: Slot [4] registered [ 3.402813] acpiphp: Slot [5] registered [ 3.403793] acpiphp: Slot [6] registered [ 3.405772] acpiphp: Slot [7] registered [ 3.406775] acpiphp: Slot [8] registered [ 3.407815] acpiphp: Slot [9] registered [ 3.409878] acpiphp: Slot [10] registered [ 3.410788] acpiphp: Slot [11] registered [ 3.411780] acpiphp: Slot [12] registered [ 3.413831] acpiphp: Slot [13] registered [ 3.414768] acpiphp: Slot [14] registered [ 3.415767] acpiphp: Slot [15] registered [ 3.417781] acpiphp: Slot [16] registered [ 3.418828] acpiphp: Slot [17] registered [ 3.419782] acpiphp: Slot [18] registered [ 3.420775] acpiphp: Slot [19] registered [ 3.422785] acpiphp: Slot [20] registered [ 3.423863] acpiphp: Slot [21] registered [ 3.424772] acpiphp: Slot [22] registered [ 3.426795] acpiphp: Slot [23] registered [ 3.427812] acpiphp: Slot [24] registered [ 3.428809] acpiphp: Slot [25] registered [ 3.429778] acpiphp: Slot [26] registered [ 3.430325] acpiphp: Slot [27] registered [ 3.430325] acpiphp: Slot [28] registered [ 3.431812] acpiphp: Slot [29] registered [ 3.432783] acpiphp: Slot [30] registered [ 3.434794] acpiphp: Slot [31] registered [ 3.435573] PCI host bridge to bus 0000:00 [ 3.436357] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [ 3.437345] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] [ 3.439347] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] [ 3.440344] pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] [ 3.442352] pci_bus 0000:00: root bus resource [bus 00-ff] [ 3.443854] pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 [ 3.447638] pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 [ 3.453035] pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 [ 3.462084] pci 0000:00:01.1: reg 0x20: [io 0xc0a0-0xc0af] [ 3.465384] pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] [ 3.467349] pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] [ 3.468336] pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] [ 3.470338] pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] [ 3.472603] pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 [ 3.481335] pci 0000:00:01.2: reg 0x20: [io 0xc040-0xc05f] [ 3.486768] pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 [ 3.489519] pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI [ 3.490378] pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB [ 3.494970] pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 [ 3.497340] pci 0000:00:03.0: reg 0x10: [io 0xc060-0xc07f] [ 3.500337] pci 0000:00:03.0: reg 0x14: [mem 0xfebc0000-0xfebc0fff] [ 3.511338] pci 0000:00:03.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] [ 3.516090] pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 [ 3.518339] pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] [ 3.521339] pci 0000:00:04.0: reg 0x14: [mem 0xfebc1000-0xfebc1fff] [ 3.535969] pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 [ 3.537338] pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] [ 3.563325] ACPI: PCI: Interrupt link LNKA configured for IRQ 10 [ 3.567904] ACPI: PCI: Interrupt link LNKB configured for IRQ 10 [ 3.571789] ACPI: PCI: Interrupt link LNKC configured for IRQ 11 [ 3.576201] ACPI: PCI: Interrupt link LNKD configured for IRQ 11 [ 3.578402] ACPI: PCI: Interrupt link LNKS configured for IRQ 9 [ 3.597477] iommu: Default domain type: Translated [ 3.598350] iommu: DMA domain TLB invalidation policy: lazy mode [ 3.604302] SCSI subsystem initialized [ 3.605383] ACPI: bus type USB registered [ 3.607209] usbcore: registered new interface driver usbfs [ 3.607753] usbcore: registered new interface driver hub [ 3.608617] usbcore: registered new device driver usb [ 3.610917] pps_core: LinuxPPS API ver. 1 registered [ 3.611349] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 3.612495] PTP clock support registered [ 3.614619] EDAC MC: Ver: 3.0.0 [ 3.623198] NetLabel: Initializing [ 3.623340] NetLabel: domain hash size = 128 [ 3.624334] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [ 3.625706] NetLabel: unlabeled traffic allowed by default [ 3.626341] PCI: Using ACPI for IRQ routing [ 3.628850] vgaarb: loaded [ 3.632525] clocksource: Switched to clocksource kvm-clock [ 4.125792] VFS: Disk quotas dquot_6.6.0 [ 4.126957] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 4.130155] pnp: PnP ACPI init [ 4.145831] pnp: PnP ACPI: found 5 devices [ 4.198020] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 4.201906] NET: Registered PF_INET protocol family [ 4.204799] IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) [ 4.211644] tcp_listen_portaddr_hash hash table entries: 2048 (order: 5, 163840 bytes, linear) [ 4.215093] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) [ 4.217956] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) [ 4.222286] TCP bind hash table entries: 32768 (order: 9, 2621440 bytes, linear) [ 4.232506] TCP: Hash tables configured (established 32768 bind 32768) [ 4.237214] MPTCP token hash table entries: 4096 (order: 6, 393216 bytes, linear) [ 4.239893] UDP hash table entries: 2048 (order: 6, 393216 bytes, linear) [ 4.242367] UDP-Lite hash table entries: 2048 (order: 6, 393216 bytes, linear) [ 4.245679] NET: Registered PF_UNIX/PF_LOCAL protocol family [ 4.247110] NET: Registered PF_XDP protocol family [ 4.248220] pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] [ 4.249606] pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] [ 4.250978] pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] [ 4.252499] pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] [ 4.255578] pci 0000:00:01.0: PIIX3: Enabling Passive Release [ 4.256900] pci 0000:00:00.0: Limiting direct PCI/PCI transfers [ 4.272751] ACPI: \_SB_.LNKD: Enabled at IRQ 11 [ 4.284049] pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x290 took 25154 usecs [ 4.286501] PCI: CLS 0 bytes, default 64 [ 4.287848] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [ 4.289596] software IO TLB: mapped [mem 0x00000000bbffa000-0x00000000bfffa000] (64MB) [ 4.293481] Trying to unpack rootfs image as initramfs... [ 4.303544] ACPI: bus type thunderbolt registered [ 4.305450] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x1e33052aadd, max_idle_ns: 440795310221 ns [ 4.331381] Initialise system trusted keyrings [ 4.332734] Key type blacklist registered [ 4.341891] workingset: timestamp_bits=36 max_order=19 bucket_order=0 [ 4.435896] zbud: loaded [ 4.449846] integrity: Platform Keyring initialized [ 4.461154] NET: Registered PF_ALG protocol family [ 4.462495] xor: automatically using best checksumming function avx [ 4.464094] Key type asymmetric registered [ 4.465118] Asymmetric key parser 'x509' registered [ 4.466267] Running certificate verification selftests [ 4.517384] cryptomgr_test (50) used greatest stack depth: 28832 bytes left [ 4.564723] cryptomgr_probe (49) used greatest stack depth: 28088 bytes left [ 4.568168] Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' [ 4.573511] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) [ 4.575978] io scheduler mq-deadline registered [ 4.577065] io scheduler kyber registered [ 4.581141] io scheduler bfq registered [ 4.591875] atomic64_test: passed for x86-64 platform with CX8 and with SSE [ 4.602149] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 [ 4.608027] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 [ 4.614269] ACPI: button: Power Button [PWRF] [ 4.649116] ACPI: \_SB_.LNKC: Enabled at IRQ 10 [ 4.651050] virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver [ 4.673716] virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver [ 4.703490] ACPI: \_SB_.LNKA: Enabled at IRQ 10 [ 4.705142] virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver [ 4.711077] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [ 4.715088] 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A [ 4.731424] Non-volatile memory driver v1.3 [ 4.742958] rdac: device handler registered [ 4.745063] hp_sw: device handler registered [ 4.746493] emc: device handler registered [ 4.748641] alua: device handler registered [ 4.755032] libphy: Fixed MDIO Bus: probed [ 4.758021] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver [ 4.760215] ehci-pci: EHCI PCI platform driver [ 4.762011] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver [ 4.764078] ohci-pci: OHCI PCI platform driver [ 4.765739] uhci_hcd: USB Universal Host Controller Interface driver [ 4.789863] uhci_hcd 0000:00:01.2: UHCI Host Controller [ 4.794931] uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 [ 4.798067] uhci_hcd 0000:00:01.2: detected 2 ports [ 4.800738] uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c040 [ 4.805895] usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 [ 4.809065] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 4.811775] usb usb1: Product: UHCI Host Controller [ 4.813618] usb usb1: Manufacturer: Linux 5.14.0-254.1844_765618331.el9.x86_64+debug uhci_hcd [ 4.816552] usb usb1: SerialNumber: 0000:00:01.2 [ 4.824760] hub 1-0:1.0: USB hub found [ 4.826845] hub 1-0:1.0: 2 ports detected [ 4.839715] usbcore: registered new interface driver usbserial_generic [ 4.842526] usbserial: USB Serial support registered for generic [ 4.846249] i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 [ 4.852799] serio: i8042 KBD port at 0x60,0x64 irq 1 [ 4.854671] serio: i8042 AUX port at 0x60,0x64 irq 12 [ 4.861225] mousedev: PS/2 mouse device common for all mice [ 4.887472] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 [ 4.901297] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 [ 4.908577] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 [ 4.914491] rtc_cmos 00:00: RTC can wake from S4 [ 4.922777] rtc_cmos 00:00: registered as rtc0 [ 4.924169] rtc_cmos 00:00: setting system clock to 2023-02-02T13:08:35 UTC (1675343315) [ 4.926695] rtc_cmos 00:00: alarms up to one day, 114 bytes nvram [ 4.928439] intel_pstate: CPU model not supported [ 4.935389] hid: raw HID events driver (C) Jiri Kosina [ 4.937663] usbcore: registered new interface driver usbhid [ 4.938996] usbhid: USB HID core driver [ 4.940208] drop_monitor: Initializing network drop monitor service [ 4.984175] Initializing XFRM netlink socket [ 4.989314] NET: Registered PF_INET6 protocol family [ 5.001117] Segment Routing with IPv6 [ 5.002577] NET: Registered PF_PACKET protocol family [ 5.005070] mpls_gso: MPLS GSO support [ 5.011227] No MBM correction factor available [ 5.012717] IPI shorthand broadcast: enabled [ 5.014591] AVX2 version of gcm_enc/dec engaged. [ 5.016582] AES CTR mode by8 optimization enabled [ 5.024187] sched_clock: Marking stable (4797080388, 226267939)->(5159946235, -136597908) [ 5.033155] registered taskstats version 1 [ 5.036504] Loading compiled-in X.509 certificates [ 5.042597] Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 792610c1c7eb3786fc55bec63b0c1aa63672d1e7' [ 5.048237] Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' [ 5.053704] Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' [ 5.063762] zswap: loaded using pool lzo/zbud [ 5.065963] cryptomgr_test (73) used greatest stack depth: 27672 bytes left [ 5.070835] debug_vm_pgtable: [debug_vm_pgtable ]: Validating architecture page table helpers [ 5.087902] page_owner is disabled [ 5.090038] Key type big_key registered [ 6.840651] Freeing initrd memory: 35908K [ 6.868591] modprobe (75) used greatest stack depth: 26968 bytes left [ 6.894707] Key type encrypted registered [ 6.895868] ima: No TPM chip found, activating TPM-bypass! [ 6.897371] Loading compiled-in module X.509 certificates [ 6.899875] Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 792610c1c7eb3786fc55bec63b0c1aa63672d1e7' [ 6.902522] ima: Allocated hash algorithm: sha256 [ 6.903921] ima: No architecture policies found [ 6.905514] evm: Initialising EVM extended attributes: [ 6.906711] evm: security.selinux [ 6.907507] evm: security.SMACK64 (disabled) [ 6.908525] evm: security.SMACK64EXEC (disabled) [ 6.909585] evm: security.SMACK64TRANSMUTE (disabled) [ 6.910736] evm: security.SMACK64MMAP (disabled) [ 6.911784] evm: security.apparmor (disabled) [ 6.912793] evm: security.ima [ 6.913512] evm: security.capability [ 6.914359] evm: HMAC attrs: 0x1 [ 7.674937] PM: Magic number: 11:566:128 [ 7.676079] acpi device:03: hash matches [ 7.715930] Freeing unused decrypted memory: 2036K [ 7.723407] Freeing unused kernel image (initmem) memory: 5300K [ 7.725270] Write protecting the kernel read-only data: 57344k [ 7.734593] Freeing unused kernel image (text/rodata gap) memory: 2036K [ 7.739617] Freeing unused kernel image (rodata/data gap) memory: 1400K [ 7.816647] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 7.817647] x86/mm: Checking user space page tables [ 7.890232] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 7.891490] Run /init as init process [ 8.019451] systemd[1]: systemd 252-3.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [ 8.026813] systemd[1]: Detected virtualization kvm. [ 8.027803] systemd[1]: Detected architecture x86-64. [ 8.028656] systemd[1]: Running in initrd. Welcome to CentOS Stream 9 dracut-057-20.git20221213.el9 (Initramfs) ! [ 8.034899] systemd[1]: Hostname set to . [ 9.051984] systemd[1]: Queued start job for default target Initrd Default Target. [ 9.079528] systemd[1]: Created slice Slice /system/systemd-hibernate-resume. [ OK ] Created slice Slice /system/systemd-hibernate-resume . [ 9.086640] systemd[1]: Started Dispatch Password Requests to Console Directory Watch. [ OK ] Started Dispatch Password …ts to Console Directory Watch . [ 9.090753] systemd[1]: Reached target Initrd /usr File System. [ OK ] Reached target Initrd /usr File System . [ 9.093955] systemd[1]: Reached target Path Units. [ OK ] Reached target Path Units . [ 9.096880] systemd[1]: Reached target Slice Units. [ OK ] Reached target Slice Units . [ 9.099487] systemd[1]: Reached target Swaps. [ OK ] Reached target Swaps . [ 9.101814] systemd[1]: Reached target Timer Units. [ OK ] Reached target Timer Units . [ 9.107080] systemd[1]: Listening on D-Bus System Message Bus Socket. [ OK ] Listening on D-Bus System Message Bus Socket . [ 9.113159] systemd[1]: Listening on Journal Socket (/dev/log). [ OK ] Listening on Journal Socket (/dev/log) . [ 9.119286] systemd[1]: Listening on Journal Socket. [ OK ] Listening on Journal Socket . [ 9.125140] systemd[1]: Listening on udev Control Socket. [ OK ] Listening on udev Control Socket . [ 9.130194] systemd[1]: Listening on udev Kernel Socket. [ OK ] Listening on udev Kernel Socket . [ 9.133258] systemd[1]: Reached target Socket Units. [ OK ] Reached target Socket Units . [ 9.156292] systemd[1]: Starting Create List of Static Device Nodes... Starting Create List of Static Device Nodes ... [ 9.194127] systemd[1]: Starting Journal Service... Starting Journal Service ... [ 9.199168] systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. [ 9.229785] systemd[1]: Starting Apply Kernel Variables... Starting Apply Kernel Variables ... [ 9.253636] systemd[1]: Starting Create System Users... Starting Create System Users ... [ 9.331788] systemd[1]: Starting Setup Virtual Console... Starting Setup Virtual Console ... [ 9.416098] systemd[1]: Finished Create List of Static Device Nodes. [ OK ] Finished Create List of Static Device Nodes . [ 9.600625] systemd[1]: Finished Apply Kernel Variables. [ OK ] Finished Apply Kernel Variables . [ 9.725560] systemd[1]: Finished Create System Users. [ OK ] Finished Create System Users . [ 9.786242] systemd[1]: Starting Create Static Device Nodes in /dev... Starting Create Static Device Nodes in /dev ... [ 10.037948] systemd[1]: Finished Create Static Device Nodes in /dev. [ OK ] Finished Create Static Device Nodes in /dev . [ 10.057606] systemd[1]: Started Journal Service. [ OK ] Started Journal Service . Starting Create Volatile Files and Directories ... [ OK ] Finished Create Volatile Files and Directories . [ OK ] Finished Setup Virtual Console . Starting dracut cmdline hook ... [ OK ] Finished dracut cmdline hook . Starting dracut pre-udev hook ... [ 12.202740] device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. [ 12.206125] device-mapper: uevent: version 1.0.3 [ 12.210030] device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com [ OK ] Finished dracut pre-udev hook . Starting Rule-based Manage…for Device Events and Files ... [ OK ] Started Rule-based Manager for Device Events and Files . Starting Coldplug All udev Devices ... [ OK ] Finished Coldplug All udev Devices . [ OK ] Reached target Network . Starting dracut initqueue hook ... [ 16.043428] virtio_blk virtio1: [vda] 106954752 512-byte logical blocks (54.8 GB/51.0 GiB) [ 16.215689] vda: vda1 vda2 [ 16.265410] virtio_net virtio0 ens3: renamed from eth0 [ 16.537546] scsi host0: ata_piix [ 16.556578] scsi host1: ata_piix [ 16.560157] ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0a0 irq 14 [ 16.561666] ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0a8 irq 15 [ 17.685751] cp (452) used greatest stack depth: 26440 bytes left [ 18.416163] lvm (463) used greatest stack depth: 26344 bytes left [ OK ] Found device /dev/mapper/cs_kvm--06--guest28-root . [ OK ] Reached target Initrd Root Device . [ OK ] Found device /dev/mapper/cs_kvm--06--guest28-swap . Starting Resume from hiber…er/cs_kvm--06--guest28-swap ... [ OK ] Finished Resume from hiber…pper/cs_kvm--06--guest28-swap . [ OK ] Reached target Preparation for Local File Systems . [ OK ] Reached target Local File Systems . [ OK ] Reached target System Initialization . [ OK ] Reached target Basic System . [ OK ] Finished dracut initqueue hook . [ OK ] Reached target Preparation for Remote File Systems . [ OK ] Reached target Remote File Systems . Starting dracut pre-mount hook ... [ OK ] Finished dracut pre-mount hook . Starting File System Check…er/cs_kvm--06--guest28-root ... [ OK ] Finished File System Check…pper/cs_kvm--06--guest28-root . Mounting /sysroot ... [ 20.798599] SGI XFS with ACLs, security attributes, scrub, verbose warnings, quota, no debug enabled [ 20.874555] XFS (dm-0): Mounting V5 Filesystem [ 21.043048] XFS (dm-0): Ending clean mount [ 21.061035] mount (492) used greatest stack depth: 25000 bytes left [ OK ] Mounted /sysroot . [ OK ] Reached target Initrd Root File System . Starting Mountpoints Configured in the Real Root ... [ 21.174395] systemd-fstab-g (504) used greatest stack depth: 24232 bytes left [ OK ] Finished Mountpoints Configured in the Real Root . [ OK ] Reached target Initrd File Systems . [ OK ] Reached target Initrd Default Target . Starting dracut pre-pivot and cleanup hook ... [ OK ] Finished dracut pre-pivot and cleanup hook . Starting Cleaning Up and Shutting Down Daemons ... [ OK ] Stopped target Network . [ OK ] Stopped target Timer Units . [ OK ] Closed D-Bus System Message Bus Socket . [ OK ] Stopped dracut pre-pivot and cleanup hook . [ OK ] Stopped target Initrd Default Target . [ OK ] Stopped target Basic System . [ OK ] Stopped target Initrd Root Device . [ OK ] Stopped target Initrd /usr File System . [ OK ] Stopped target Path Units . [ OK ] Stopped Dispatch Password …ts to Console Directory Watch . [ OK ] Stopped target Remote File Systems . [ OK ] Stopped target Preparation for Remote File Systems . [ OK ] Stopped target Slice Units . [ OK ] Stopped target Socket Units . [ OK ] Stopped target System Initialization . [ OK ] Stopped target Local File Systems . [ OK ] Stopped target Preparation for Local File Systems . [ OK ] Stopped target Swaps . [ OK ] Stopped dracut pre-mount hook . [ OK ] Stopped dracut initqueue hook . [ OK ] Stopped Apply Kernel Variables . [ OK ] Stopped Create Volatile Files and Directories . [ OK ] Stopped Coldplug All udev Devices . Stopping Rule-based Manage…for Device Events and Files ... [ OK ] Stopped Setup Virtual Console . [ OK ] Finished Cleaning Up and Shutting Down Daemons . [ OK ] Stopped Rule-based Manager for Device Events and Files . [ OK ] Closed udev Control Socket . [ OK ] Closed udev Kernel Socket . [ OK ] Stopped dracut pre-udev hook . [ OK ] Stopped dracut cmdline hook . Starting Cleanup udev Database ... [ OK ] Stopped Create Static Device Nodes in /dev . [ OK ] Stopped Create List of Static Device Nodes . [ OK ] Stopped Create System Users . [ OK ] Finished Cleanup udev Database . [ OK ] Reached target Switch Root . Starting Switch Root ... [ 22.777813] systemd-journald[233]: Received SIGTERM from PID 1 (systemd). [ 25.710054] SELinux: policy capability network_peer_controls=1 [ 25.715928] SELinux: policy capability open_perms=1 [ 25.716657] SELinux: policy capability extended_socket_class=1 [ 25.717499] SELinux: policy capability always_check_network=0 [ 25.718296] SELinux: policy capability cgroup_seclabel=1 [ 25.719061] SELinux: policy capability nnp_nosuid_transition=1 [ 25.719889] SELinux: policy capability genfs_seclabel_symlinks=1 [ 26.228461] audit: type=1403 audit(1675343336.803:2): auid=4294967295 ses=4294967295 lsm=selinux res=1 [ 26.252609] systemd[1]: Successfully loaded SELinux policy in 2.569950s. [ 26.297577] systemd[1]: RTC configured in localtime, applying delta of -300 minutes to system time. [ 26.535682] systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 204.502ms. [ 26.568075] systemd[1]: systemd 252-3.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [ 26.573208] systemd[1]: Detected virtualization kvm. [ 26.573983] systemd[1]: Detected architecture x86-64. Welcome to CentOS Stream 9 ! [ 27.049220] grep (546) used greatest stack depth: 24152 bytes left [ 27.081685] kdump-dep-gener (535) used greatest stack depth: 23976 bytes left [ 27.437874] systemd-rc-local-generator[552]: /etc/rc.d/rc.local is not marked executable, skipping. [ 28.107022] systemd[1]: /usr/lib/systemd/system/restraintd.service:8: Standard output type syslog+console is obsolete, automatically updating to journal+console. Please update your unit file, and consider removing the setting altogether. [ 28.379696] systemd[1]: initrd-switch-root.service: Deactivated successfully. [ 28.385894] systemd[1]: Stopped Switch Root. [ OK ] Stopped Switch Root . [ 28.394056] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 28.403300] systemd[1]: Created slice Slice /system/getty. [ OK ] Created slice Slice /system/getty . [ 28.419439] systemd[1]: Created slice Slice /system/modprobe. [ OK ] Created slice Slice /system/modprobe . [ 28.434671] systemd[1]: Created slice Slice /system/serial-getty. [ OK ] Created slice Slice /system/serial-getty . [ 28.449488] systemd[1]: Created slice Slice /system/sshd-keygen. [ OK ] Created slice Slice /system/sshd-keygen . [ 28.469659] systemd[1]: Created slice User and Session Slice. [ OK ] Created slice User and Session Slice . [ 28.479709] systemd[1]: Started Dispatch Password Requests to Console Directory Watch. [ OK ] Started Dispatch Password …ts to Console Directory Watch . [ 28.486974] systemd[1]: Started Forward Password Requests to Wall Directory Watch. [ OK ] Started Forward Password R…uests to Wall Directory Watch . [ 28.498822] systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. [ OK ] Set up automount Arbitrary…s File System Automount Point . [ 28.502933] systemd[1]: Reached target Local Encrypted Volumes. [ OK ] Reached target Local Encrypted Volumes . [ 28.505640] systemd[1]: Stopped target Switch Root. [ OK ] Stopped target Switch Root . [ 28.507829] systemd[1]: Stopped target Initrd File Systems. [ OK ] Stopped target Initrd File Systems . [ 28.510216] systemd[1]: Stopped target Initrd Root File System. [ OK ] Stopped target Initrd Root File System . [ 28.512796] systemd[1]: Reached target Local Integrity Protected Volumes. [ OK ] Reached target Local Integrity Protected Volumes . [ 28.515590] systemd[1]: Reached target Path Units. [ OK ] Reached target Path Units . [ 28.517781] systemd[1]: Reached target Slice Units. [ OK ] Reached target Slice Units . [ 28.519989] systemd[1]: Reached target System Time Set. [ OK ] Reached target System Time Set . [ 28.522576] systemd[1]: Reached target Local Verity Protected Volumes. [ OK ] Reached target Local Verity Protected Volumes . [ 28.528476] systemd[1]: Listening on Device-mapper event daemon FIFOs. [ OK ] Listening on Device-mapper event daemon FIFOs . [ 28.536869] systemd[1]: Listening on LVM2 poll daemon socket. [ OK ] Listening on LVM2 poll daemon socket . [ 28.654790] systemd[1]: Listening on RPCbind Server Activation Socket. [ OK ] Listening on RPCbind Server Activation Socket . [ 28.658001] systemd[1]: Reached target RPC Port Mapper. [ OK ] Reached target RPC Port Mapper . [ 28.671121] systemd[1]: Listening on Process Core Dump Socket. [ OK ] Listening on Process Core Dump Socket . [ 28.675903] systemd[1]: Listening on initctl Compatibility Named Pipe. [ OK ] Listening on initctl Compatibility Named Pipe . [ 28.686195] systemd[1]: Listening on udev Control Socket. [ OK ] Listening on udev Control Socket . [ 28.692486] systemd[1]: Listening on udev Kernel Socket. [ OK ] Listening on udev Kernel Socket . [ 28.715014] systemd[1]: Activating swap /dev/mapper/cs_kvm--06--guest28-swap... Activating swap /dev/mapper/cs_kvm--06--guest28-swap ... [ 28.747004] systemd[1]: Mounting Huge Pages File System... Mounting Huge Pages File System ... [ 28.778755] systemd[1]: Mounting POSIX Message Queue File System... Mounting POSIX Message Queue File System ... [ 28.783498] Adding 4145148k swap on /dev/mapper/cs_kvm--06--guest28-swap. Priority:-2 extents:1 across:4145148k FS [ 28.820588] systemd[1]: Mounting Kernel Debug File System... Mounting Kernel Debug File System ... [ 28.876900] systemd[1]: Mounting Kernel Trace File System... Mounting Kernel Trace File System ... [ 28.881154] systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). [ 28.913699] systemd[1]: Starting Create List of Static Device Nodes... Starting Create List of Static Device Nodes ... [ 28.956592] systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Starting Monitoring of LVM…meventd or progress polling ... [ 29.033948] systemd[1]: Starting Load Kernel Module configfs... Starting Load Kernel Module configfs ... [ 29.067072] systemd[1]: Starting Load Kernel Module drm... Starting Load Kernel Module drm ... [ 29.126695] systemd[1]: Starting Load Kernel Module fuse... Starting Load Kernel Module fuse ... [ 29.215178] systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Starting Read and set NIS …from /etc/sysconfig/network ... [ 29.238940] systemd[1]: systemd-fsck-root.service: Deactivated successfully. [ 29.242660] systemd[1]: Stopped File System Check on Root Device. [ OK ] Stopped File System Check on Root Device . [ 29.256256] systemd[1]: Stopped Journal Service. [ OK ] Stopped Journal Service . [ 29.365465] systemd[1]: Starting Journal Service... Starting Journal Service ... [ 29.398206] systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. [ 29.444181] fuse: init (API version 7.36) [ 29.499065] systemd[1]: Starting Generate network units from Kernel command line... Starting Generate network …ts from Kernel command line ... [ 29.639223] systemd[1]: Starting Remount Root and Kernel File Systems... Starting Remount Root and Kernel File Systems ... [ 29.659162] systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. [ 29.752000] ACPI: bus type drm_connector registered [ 29.782403] systemd[1]: Starting Apply Kernel Variables... Starting Apply Kernel Variables ... [ 29.889835] systemd[1]: Starting Coldplug All udev Devices... Starting Coldplug All udev Devices ... [ 30.107819] systemd[1]: Activated swap /dev/mapper/cs_kvm--06--guest28-swap. [ OK ] Activated swap /dev/mapper/cs_kvm--06--guest28-swap . [ 30.247952] systemd[1]: Started Journal Service. [ OK ] Started Journal Service . [ OK ] Mounted Huge Pages File System . [ OK ] Mounted POSIX Message Queue File System . [ OK ] Mounted Kernel Debug File System . [ OK ] Mounted Kernel Trace File System . [ OK ] Finished Create List of Static Device Nodes . [ OK ] Finished Monitoring of LVM… dmeventd or progress polling . [ OK ] Finished Load Kernel Module configfs . [ OK ] Finished Load Kernel Module drm . [ OK ] Finished Load Kernel Module fuse . [ OK ] Finished Read and set NIS …e from /etc/sysconfig/network . [ OK ] Finished Generate network units from Kernel command line . [ OK ] Finished Remount Root and Kernel File Systems . [ OK ] Finished Apply Kernel Variables . [ OK ] Reached target Preparation for Network . [ OK ] Reached target Swaps . Mounting FUSE Control File System ... Mounting Kernel Configuration File System ... Starting Flush Journal to Persistent Storage ... Starting Load/Save Random Seed ... Starting Create Static Device Nodes in /dev ... [ OK ] Mounted FUSE Control File System . [ OK ] Mounted Kernel Configuration File System . [ 30.960372] systemd-journald[572]: Received client request to flush runtime journal. [ OK ] Finished Flush Journal to Persistent Storage . [ OK ] Finished Load/Save Random Seed . [ OK ] Finished Create Static Device Nodes in /dev . [ OK ] Reached target Preparation for Local File Systems . Starting Rule-based Manage…for Device Events and Files ... [ OK ] Started Rule-based Manager for Device Events and Files . Starting Load Kernel Module configfs ... [ OK ] Finished Load Kernel Module configfs . [ OK ] Finished Coldplug All udev Devices . Mounting /boot ... [ 33.612699] XFS (vda1): Mounting V5 Filesystem [ 34.173236] XFS (vda1): Ending clean mount [ OK ] Mounted /boot . [ OK ] Reached target Local File Systems . Starting Automatic Boot Loader Update ... Starting Create Volatile Files and Directories ... [ OK ] Finished Automatic Boot Loader Update . [ OK ] Finished Create Volatile Files and Directories . Mounting RPC Pipe File System ... Starting Security Auditing Service ... [ 35.287794] piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Starting RPC Bind ... [ OK ] Started RPC Bind . [ 35.886005] input: PC Speaker as /devices/platform/pcspkr/input/input5 [ 36.105683] mktemp (632) used greatest stack depth: 22456 bytes left [ 36.139764] RPC: Registered named UNIX socket transport module. [ 36.140762] RPC: Registered udp transport module. [ 36.141472] RPC: Registered tcp transport module. [ 36.142236] RPC: Registered tcp NFSv4.1 backchannel transport module. [ OK ] Mounted RPC Pipe File System . [ OK ] Reached target rpc_pipefs.target . [ OK ] Started Security Auditing Service . Starting Record System Boot/Shutdown in UTMP ... [ OK ] Started /usr/sbin/lvm vgch…ation event cs_kvm-06-guest28 . [ OK ] Finished Record System Boot/Shutdown in UTMP . [ OK ] Reached target System Initialization . [ OK ] Started dnf makecache --timer . [ OK ] Started Daily Cleanup of Temporary Directories . [ OK ] Listening on D-Bus System Message Bus Socket . [ OK ] Listening on SSSD Kerberos…ache Manager responder socket . [ OK ] Reached target Socket Units . [ OK ] Reached target Basic System . Starting Network Manager ... Starting NTP client/server ... Starting Restore /run/initramfs on shutdown ... [ OK ] Started irqbalance daemon . Starting System Logging Service ... [ OK ] Reached target sshd-keygen.target . [ OK ] Reached target User and Group Name Lookups . Starting User Login Management ... [ OK ] Started System Logging Service . [ OK ] Finished Restore /run/initramfs on shutdown . Starting D-Bus System Message Bus ... [ OK ] Started NTP client/server . Starting Wait for chrony to synchronize system clock ... [ OK ] Started D-Bus System Message Bus . [ OK ] Started User Login Management . [ OK ] Started Network Manager . [ OK ] Created slice User Slice of UID 0 . [ OK ] Reached target Network . Starting Network Manager Wait Online ... Starting GSSAPI Proxy Daemon ... Starting OpenSSH server daemon ... Starting User Runtime Directory /run/user/0 ... Starting Hostname Service ... [ OK ] Finished User Runtime Directory /run/user/0 . Starting User Manager for UID 0 ... [ OK ] Started GSSAPI Proxy Daemon . [ OK ] Reached target NFS client services . [ OK ] Reached target Preparation for Remote File Systems . [ OK ] Reached target Remote File Systems . Starting Permit User Sessions ... [ OK ] Started OpenSSH server daemon . [ OK ] Finished Permit User Sessions . [ OK ] Started Getty on tty1 . [ OK ] Started Serial Getty on ttyS0 . [ OK ] Reached target Login Prompts . [ OK ] Started Hostname Service . [ OK ] Listening on Load/Save RF …itch Status /dev/rfkill Watch . Starting Network Manager Script Dispatcher Service ... [ OK ] Started Network Manager Script Dispatcher Service . [ OK ] Finished Network Manager Wait Online . [ OK ] Reached target Network is Online . [ OK ] Started Anaconda Monitorin…ost-boot notification program . Starting Crash recovery kernel arming ... Starting Notify NFS peers of a restart ... [ OK ] Started Notify NFS peers of a restart . [ OK ] Started User Manager for UID 0 . CentOS Stream 9 Kernel 5.14.0-254.1844_765618331.el9.x86_64+debug on an x86_64 kvm-06-guest28 login: [ 57.252073] PKCS7: Message signed outside of X.509 validity window [ 59.521913] restraintd[1269]: * Fetching recipe: http://lab-02.hosts.prod.psi.bos.redhat.com:8000//recipes/13327125/ [ 59.676548] restraintd[1269]: * Parsing recipe [ 59.695679] restraintd[1269]: * Running recipe [ 59.698831] restraintd[1269]: ** Continuing task: 155711322 [/mnt/tests/github.com/beaker-project/beaker-core-tasks/archive/master.tar.gz/reservesys] [ 59.711320] restraintd[1269]: ** Preparing metadata [ 59.836401] restraintd[1269]: ** Refreshing peer role hostnames: Retries 0 [ 59.974600] restraintd[1269]: ** Updating env vars [ 59.975389] restraintd[1269]: *** Current Time: Thu Feb 02 13:09:30 2023 Localwatchdog at: * Disabled! * [ 60.015776] restraintd[1269]: ** Running task: 155711322 [/distribution/reservesys] [ 62.476444] Running test [R:13327125 T:155711322 - /distribution/reservesys - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [ 77.932260] Running test [R:13327125 T:6 - /kernel/kdump/setup-nfsdump - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [-- MARK -- Thu Feb 2 18:10:00 2023] [ 92.267484] systemd-rc-local-generator[2111]: /etc/rc.d/rc.local is not marked executable, skipping. [ 93.949529] FS-Cache: Loaded [ 94.299068] Key type dns_resolver registered [ 94.853883] NFS: Registering the id_resolver key type [ 94.854812] Key type id_resolver registered [ 94.856084] Key type id_legacy registered [ 114.871558] dracut-install (2827) used greatest stack depth: 21072 bytes left [ 206.541126] PKCS7: Message signed outside of X.509 validity window [ 336.359898] systemd-rc-local-generator[5923]: /etc/rc.d/rc.local is not marked executable, skipping. [-- MARK -- Thu Feb 2 18:15:00 2023] [ 592.869863] Running test [R:13327125 T:7 - LTP: openposix test suite - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [-- MARK -- Thu Feb 2 18:20:00 2023] [ 786.399937] hrtimer: interrupt took 3258800 ns [-- MARK -- Thu Feb 2 18:25:00 2023] [-- MARK -- Thu Feb 2 18:30:00 2023] [-- MARK -- Thu Feb 2 18:35:00 2023] [-- MARK -- Thu Feb 2 18:40:00 2023] [-- MARK -- Thu Feb 2 18:45:00 2023] [ 2473.478326] mmap_6-1.run-te[65328]: segfault at 7f350620e000 ip 0000000000401392 sp 00007ffd2f6873c0 error 6 in mmap_6-1.run-test[401000+1000] [ 2473.493870] Code: ff 8b 00 89 c7 e8 7e fd ff ff 48 89 c6 bf 62 20 40 00 b8 00 00 00 00 e8 0c fd ff ff b8 01 00 00 00 e9 e5 00 00 00 48 8b 45 d8 00 62 b8 00 00 00 00 e9 d4 00 00 00 e8 9c fc ff ff 8b 00 89 c7 [ 2474.338069] mmap_6-2.run-te[65349]: segfault at 7f93d4cee000 ip 0000000000401414 sp 00007ffc62deb190 error 4 in mmap_6-2.run-test[401000+1000] [ 2474.340014] Code: ff 8b 00 89 c7 e8 0c fd ff ff 48 89 c6 bf 5e 20 40 00 b8 00 00 00 00 e8 9a fc ff ff b8 01 00 00 00 e9 fd 00 00 00 48 8b 45 c8 <0f> b6 00 3c 61 74 14 bf 78 20 40 00 e8 3b fc ff ff b8 01 00 00 00 [ 2475.250492] mmap_6-3.run-te[65370]: segfault at 7ffbe54fd000 ip 000000000040134e sp 00007fff1cdacdb0 error 6 in mmap_6-3.run-test[401000+1000] [ 2475.252495] Code: ff 8b 00 89 c7 e8 c2 fd ff ff 48 89 c6 bf 48 20 40 00 b8 00 00 00 00 e8 50 fd ff ff b8 01 00 00 00 e9 cf 00 00 00 48 8b 45 d8 00 62 b8 00 00 00 00 e9 be 00 00 00 bf 5b 20 40 00 e8 7b fd ff [-- MARK -- Thu Feb 2 18:50:00 2023] [-- MARK -- Thu Feb 2 18:55:00 2023] [ 2804.548919] pthread_create_[91967]: segfault at 7efdf86e6ff8 ip 00007efdf851a95b sp 00007efdf86e7000 error 6 in libc.so.6[7efdf8428000+175000] [ 2804.559957] Code: 41 5c 41 5d 41 5e 41 5f 5d c3 0f 1f 44 00 00 48 83 4c 04 f8 00 e9 7a ff ff ff e8 20 2c 04 00 f3 0f 1e fa 41 55 41 54 55 89 fd <53> 48 83 ec 48 64 48 8b 04 25 28 00 00 00 48 89 44 24 38 31 c0 8d [ 2805.321106] pthread_create_[91977]: segfault at 7efdf86f1ff8 ip 00007efdf851a95b sp 00007efdf86f2000 error 6 in libc.so.6[7efdf8428000+175000] [ 2805.322979] Code: 41 5c 41 5d 41 5e 41 5f 5d c3 0f 1f 44 00 00 48 83 4c 04 f8 00 e9 7a ff ff ff e8 20 2c 04 00 f3 0f 1e fa 41 55 41 54 55 89 fd <53> 48 83 ec 48 64 48 8b 04 25 28 00 00 00 48 89 44 24 38 31 c0 8d [ 2807.134136] pthread_create_[92072]: segfault at 7fcb8469bff8 ip 00007fcb8451a95b sp 00007fcb8469c000 error 6 in libc.so.6[7fcb84428000+175000] [ 2807.136272] Code: 41 5c 41 5d 41 5e 41 5f 5d c3 0f 1f 44 00 00 48 83 4c 04 f8 00 e9 7a ff ff ff e8 20 2c 04 00 f3 0f 1e fa 41 55 41 54 55 89 fd <53> 48 83 ec 48 64 48 8b 04 25 28 00 00 00 48 89 44 24 38 31 c0 8d [ 2808.124854] pthread_create_[92077]: segfault at 7fcb8469bff8 ip 00007fcb8451a95b sp 00007fcb8469c000 error 6 in libc.so.6[7fcb84428000+175000] [ 2808.126752] Code: 41 5c 41 5d 41 5e 41 5f 5d c3 0f 1f 44 00 00 48 83 4c 04 f8 00 e9 7a ff ff ff e8 20 2c 04 00 f3 0f 1e fa 41 55 41 54 55 89 fd <53> 48 83 ec 48 64 48 8b 04 25 28 00 00 00 48 89 44 24 38 31 c0 8d [ 2809.802227] pthread_create_[92086]: segfault at 7fcb8469bff8 ip 00007fcb8451a95b sp 00007fcb8469c000 error 6 in libc.so.6[7fcb84428000+175000] [ 2809.805345] Code: 41 5c 41 5d 41 5e 41 5f 5d c3 0f 1f 44 00 00 48 83 4c 04 f8 00 e9 7a ff ff ff e8 20 2c 04 00 f3 0f 1e fa 41 55 41 54 55 89 fd <53> 48 83 ec 48 64 48 8b 04 25 28 00 00 00 48 89 44 24 38 31 c0 8d [ 2810.577913] pthread_create_[92096]: segfault at 7fcb8469bff8 ip 00007fcb8451a95b sp 00007fcb8469c000 error 6 in libc.so.6[7fcb84428000+175000] [ 2810.579807] Code: 41 5c 41 5d 41 5e 41 5f 5d c3 0f 1f 44 00 00 48 83 4c 04 f8 00 e9 7a ff ff ff e8 20 2c 04 00 f3 0f 1e fa 41 55 41 54 55 89 fd <53> 48 83 ec 48 64 48 8b 04 25 28 00 00 00 48 89 44 24 38 31 c0 8d [ 2811.409216] pthread_create_[92104]: segfault at 7fcb8469bff8 ip 00007fcb8451a95b sp 00007fcb8469c000 error 6 in libc.so.6[7fcb84428000+175000] [ 2811.416794] Code: 41 5c 41 5d 41 5e 41 5f 5d c3 0f 1f 44 00 00 48 83 4c 04 f8 00 e9 7a ff ff ff e8 20 2c 04 00 f3 0f 1e fa 41 55 41 54 55 89 fd <53> 48 83 ec 48 64 48 8b 04 25 28 00 00 00 48 89 44 24 38 31 c0 8d [-- MARK -- Thu Feb 2 19:00:00 2023] [-- MARK -- Thu Feb 2 19:05:00 2023] [-- MARK -- Thu Feb 2 19:10:00 2023] [ 3894.844213] sched: RT throttling activated [ 3950.931974] Running test [R:13327125 T:8 - KUNIT - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [ 3964.508190] # Subtest: bitfields [ 3964.508206] 1..2 [ 3964.517376] ok 1 - test_bitfields_constants [ 3964.518647] ok 2 - test_bitfields_variables [ 3964.519585] ok 1 - bitfields [ 3965.187845] # Subtest: cmdline [ 3965.187858] 1..4 [ 3965.189160] ok 1 - cmdline_test_noint [ 3965.190218] ok 2 - cmdline_test_lead_int [ 3965.191461] ok 3 - cmdline_test_tail_int [ 3965.192772] ok 4 - cmdline_test_range [ 3965.193592] ok 2 - cmdline [ 3965.867122] # Subtest: ext4_inode_test [ 3965.867136] 1..1 [ 3965.868863] # inode_test_xtimestamp_decoding: ok 1 - 1901-12-13 Lower bound of 32bit < 0 timestamp, no extra bits [ 3965.869838] # inode_test_xtimestamp_decoding: ok 2 - 1969-12-31 Upper bound of 32bit < 0 timestamp, no extra bits [ 3965.871757] # inode_test_xtimestamp_decoding: ok 3 - 1970-01-01 Lower bound of 32bit >=0 timestamp, no extra bits [ 3965.873832] # inode_test_xtimestamp_decoding: ok 4 - 2038-01-19 Upper bound of 32bit >=0 timestamp, no extra bits [ 3965.876001] # inode_test_xtimestamp_decoding: ok 5 - 2038-01-19 Lower bound of 32bit <0 timestamp, lo extra sec bit on [ 3965.878213] # inode_test_xtimestamp_decoding: ok 6 - 2106-02-07 Upper bound of 32bit <0 timestamp, lo extra sec bit on [ 3965.881879] # inode_test_xtimestamp_decoding: ok 7 - 2106-02-07 Lower bound of 32bit >=0 timestamp, lo extra sec bit on [ 3965.884700] # inode_test_xtimestamp_decoding: ok 8 - 2174-02-25 Upper bound of 32bit >=0 timestamp, lo extra sec bit on [ 3965.887284] # inode_test_xtimestamp_decoding: ok 9 - 2174-02-25 Lower bound of 32bit <0 timestamp, hi extra sec bit on [ 3965.890288] # inode_test_xtimestamp_decoding: ok 10 - 2242-03-16 Upper bound of 32bit <0 timestamp, hi extra sec bit on [ 3965.892973] # inode_test_xtimestamp_decoding: ok 11 - 2242-03-16 Lower bound of 32bit >=0 timestamp, hi extra sec bit on [ 3965.895729] # inode_test_xtimestamp_decoding: ok 12 - 2310-04-04 Upper bound of 32bit >=0 timestamp, hi extra sec bit on [ 3965.898833] # inode_test_xtimestamp_decoding: ok 13 - 2310-04-04 Upper bound of 32bit>=0 timestamp, hi extra sec bit 1. 1 ns [ 3965.901937] # inode_test_xtimestamp_decoding: ok 14 - 2378-04-22 Lower bound of 32bit>= timestamp. Extra sec bits 1. Max ns [ 3965.904866] # inode_test_xtimestamp_decoding: ok 15 - 2378-04-22 Lower bound of 32bit >=0 timestamp. All extra sec bits on [ 3965.908041] # inode_test_xtimestamp_decoding: ok 16 - 2446-05-10 Upper bound of 32bit >=0 timestamp. All extra sec bits on [ 3965.910154] ok 1 - inode_test_xtimestamp_decoding [ 3965.912270] ok 3 - ext4_inode_test [ 3967.365493] # Subtest: kunit-try-catch-test [ 3967.365525] 1..2 [ 3967.368811] ok 1 - kunit_test_try_catch_successful_try_no_catch [ 3967.370531] ok 2 - kunit_test_try_catch_unsuccessful_try_does_catch [ 3967.371642] ok 4 - kunit-try-catch-test [ 3967.374097] # Subtest: kunit-resource-test [ 3967.374106] 1..7 [ 3967.375990] ok 1 - kunit_resource_test_init_resources [ 3967.376883] ok 2 - kunit_resource_test_alloc_resource [ 3967.379196] ok 3 - kunit_resource_test_destroy_resource [ 3967.381740] ok 4 - kunit_resource_test_cleanup_resources [ 3967.383916] ok 5 - kunit_resource_test_proper_free_ordering [ 3967.385825] ok 6 - kunit_resource_test_static [ 3967.387288] ok 7 - kunit_resource_test_named [ 3967.388053] ok 5 - kunit-resource-test [ 3967.389736] # Subtest: kunit-log-test [ 3967.389745] 1..1 [ 3967.390815] put this in log. [ 3967.391179] this too. [ 3967.391666] add to suite log. [ 3967.392004] along with this. [ 3967.392517] ok 1 - kunit_log_test [ 3967.392958] ok 6 - kunit-log-test [ 3967.394262] # Subtest: kunit_status [ 3967.394270] 1..2 [ 3967.395362] ok 1 - kunit_status_set_failure_test [ 3967.396712] ok 2 - kunit_status_mark_skipped_test [ 3967.397449] ok 7 - kunit_status [ 3967.542107] # Subtest: rtc_lib_test_cases [ 3967.542120] 1..1 [ 3973.760350] ok 1 - rtc_time64_to_tm_test_date_range [ 3973.769158] ok 8 - rtc_lib_test_cases [ 3973.968422] # Subtest: list-kunit-test [ 3973.968436] 1..36 [ 3973.970071] ok 1 - list_test_list_init [ 3973.971106] ok 2 - list_test_list_add [ 3973.972078] ok 3 - list_test_list_add_tail [ 3973.973402] ok 4 - list_test_list_del [ 3973.975209] ok 5 - list_test_list_replace [ 3973.976209] ok 6 - list_test_list_replace_init [ 3973.977508] ok 7 - list_test_list_swap [ 3973.978769] ok 8 - list_test_list_del_init [ 3973.979795] ok 9 - list_test_list_move [ 3973.981055] ok 10 - list_test_list_move_tail [ 3973.982227] ok 11 - list_test_list_bulk_move_tail [ 3973.983621] ok 12 - list_test_list_is_first [ 3973.984924] ok 13 - list_test_list_is_last [ 3973.986069] ok 14 - list_test_list_empty [ 3973.987116] ok 15 - list_test_list_empty_careful [ 3973.988418] ok 16 - list_test_list_rotate_left [ 3973.989611] ok 17 - list_test_list_rotate_to_front [ 3973.991051] ok 18 - list_test_list_is_singular [ 3973.992163] ok 19 - list_test_list_cut_position [ 3973.993512] ok 20 - list_test_list_cut_before [ 3973.994738] ok 21 - list_test_list_splice [ 3973.995933] ok 22 - list_test_list_splice_tail [ 3973.997140] ok 23 - list_test_list_splice_init [ 3973.998177] ok 24 - list_test_list_splice_tail_init [ 3973.999518] ok 25 - list_test_list_entry [ 3974.000851] ok 26 - list_test_list_first_entry [ 3974.002271] ok 27 - list_test_list_last_entry [ 3974.003357] ok 28 - list_test_list_first_entry_or_null [ 3974.004641] ok 29 - list_test_list_next_entry [ 3974.006235] ok 30 - list_test_list_prev_entry [ 3974.007401] ok 31 - list_test_list_for_each [ 3974.008488] ok 32 - list_test_list_for_each_prev [ 3974.009659] ok 33 - list_test_list_for_each_safe [ 3974.011052] ok 34 - list_test_list_for_each_prev_safe [ 3974.012214] ok 35 - list_test_list_for_each_entry [ 3974.013848] ok 36 - list_test_list_for_each_entry_reverse [ 3974.014586] ok 9 - list-kunit-test [ 3974.199364] # Subtest: memcpy [ 3974.199378] 1..4 [ 3974.200993] # memset_test: ok: memset() direct assignment [ 3974.202278] # memset_test: ok: memset() complete overwrite [ 3974.203193] # memset_test: ok: memset() middle overwrite [ 3974.204076] # memset_test: ok: memset() argument side-effects [ 3974.205017] # memset_test: ok: memset() memset_after() [ 3974.205855] # memset_test: ok: memset() memset_startat() [ 3974.206782] ok 1 - memset_test [ 3974.207319] # memcpy_test: ok: memcpy() static initializers [ 3974.208841] # memcpy_test: ok: memcpy() direct assignment [ 3974.209758] # memcpy_test: ok: memcpy() complete overwrite [ 3974.210630] # memcpy_test: ok: memcpy() middle overwrite [ 3974.211522] # memcpy_test: ok: memcpy() argument side-effects [ 3974.212487] ok 2 - memcpy_test [ 3974.213033] # memmove_test: ok: memmove() static initializers [ 3974.214611] # memmove_test: ok: memmove() direct assignment [ 3974.215536] # memmove_test: ok: memmove() complete overwrite [ 3974.216458] # memmove_test: ok: memmove() middle overwrite [ 3974.217360] # memmove_test: ok: memmove() argument side-effects [ 3974.218326] # memmove_test: ok: memmove() overlapping write [ 3974.219280] ok 3 - memmove_test [ 3974.219826] ok 4 - strtomem_test [ 3974.220388] ok 10 - memcpy [ 3974.378138] # Subtest: mptcp-crypto [ 3974.378152] 1..1 [ 3974.379491] ok 1 - mptcp_crypto_test_basic [ 3974.379923] ok 11 - mptcp-crypto [ 3974.547554] # Subtest: mptcp-token [ 3974.547570] 1..4 [ 3974.549968] ok 1 - mptcp_token_test_req_basic [ 3974.551543] ok 2 - mptcp_token_test_msk_basic [ 3974.553299] ok 3 - mptcp_token_test_accept [ 3974.555059] ok 4 - mptcp_token_test_destroyed [ 3974.556373] ok 12 - mptcp-token [ 3974.967392] # Subtest: rational [ 3974.967407] 1..1 [ 3974.968843] # rational_test: ok 1 - Exceeds bounds, semi-convergent term > 1/2 last term [ 3974.970825] # rational_test: ok 2 - Exceeds bounds, semi-convergent term < 1/2 last term [ 3974.973181] # rational_test: ok 3 - Closest to zero [ 3974.975422] # rational_test: ok 4 - Closest to smallest non-zero [ 3974.977523] # rational_test: ok 5 - Use convergent [ 3974.979008] # rational_test: ok 6 - Exact answer [ 3974.980360] # rational_test: ok 7 - Semiconvergent, numerator limit [ 3974.981738] # rational_test: ok 8 - Semiconvergent, denominator limit [ 3974.982748] ok 1 - rational_test [ 3974.983781] ok 13 - rational [ 3975.148383] # Subtest: resource [ 3975.148398] 1..2 [ 3975.150275] ok 1 - resource_test_union [ 3975.151370] ok 2 - resource_test_intersection [ 3975.152480] ok 14 - resource [ 3975.328480] # Subtest: slub_test [ 3975.328497] 1..2 [ 3975.345480] ok 1 - test_clobber_zone [ 3975.356186] ok 2 - test_clobber_redzone_free [ 3975.357425] ok 15 - slub_test [ 3975.979146] # Subtest: snd_soc_tplg_test [ 3975.979162] 1..11 [ 3975.981984] ok 1 - snd_soc_tplg_test_load_with_null_comp [ 3975.983833] ok 2 - snd_soc_tplg_test_load_with_null_ops [ 3975.986458] ok 3 - snd_soc_tplg_test_load_with_null_fw [ 3975.989014] ok 4 - snd_soc_tplg_test_load_empty_tplg [ 3975.992118] ok 5 - snd_soc_tplg_test_load_empty_tplg_bad_magic [ 3975.994910] ok 6 - snd_soc_tplg_test_load_empty_tplg_bad_abi [ 3975.998154] ok 7 - snd_soc_tplg_test_load_empty_tplg_bad_size [ 3976.001023] ok 8 - snd_soc_tplg_test_load_empty_tplg_bad_payload_size [ 3976.003886] ok 9 - snd_soc_tplg_test_load_pcm_tplg [ 3976.008251] ok 10 - snd_soc_tplg_test_load_pcm_tplg_reload_comp [ 3976.014000] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.018472] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.074346] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.079188] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.113093] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.121099] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.217067] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.221141] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.300157] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.306380] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.329185] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.332122] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.364218] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.369555] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.398339] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.401040] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.438246] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.441692] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.478217] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.480976] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.555332] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.560356] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.620005] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.622812] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.647273] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.652043] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.672848] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.676040] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.703804] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.709127] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.770909] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.775692] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.803536] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.806203] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.826606] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.829571] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.869626] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.874185] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.956151] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.960410] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.995655] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.006182] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.052752] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.055630] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.083070] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.088366] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.111613] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.114696] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.153558] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.156256] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.189904] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.192612] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.225134] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.227807] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.245634] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.248298] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.288506] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.291237] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.324150] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.327220] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.347376] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.353383] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.400821] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.403729] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.429749] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.432446] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.455944] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.464372] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.496596] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.505149] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.524608] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.532848] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.578695] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.582551] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.606609] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.612366] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.644228] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.650552] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.683440] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.689098] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.731424] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.735017] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.763937] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.766753] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.820549] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.825134] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.846266] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.854128] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.900925] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.904184] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.947882] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.950627] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.990899] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.999009] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.041292] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.054659] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.085950] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.089541] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.117912] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.126081] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.165296] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.169086] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.194692] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.200426] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.246409] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.249228] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.282968] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.287761] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.321940] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.324797] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.348762] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.351433] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.410684] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.426794] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.470919] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.479771] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.507725] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.511453] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.551203] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.556496] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.577998] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.582036] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.627733] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.631060] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.658257] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.661349] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.696363] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.699125] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.724819] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.728773] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.782447] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.787442] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.836445] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.844019] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.880005] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.882668] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.922328] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.925038] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.949403] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.954259] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.987134] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.989831] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.026778] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.030060] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.084934] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.087953] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.113957] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.116794] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.148999] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.153054] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.173118] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.176710] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.207005] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.211397] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.241970] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.245079] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.297422] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.302216] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.323175] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.331146] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.356151] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.359457] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.412630] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.416020] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.464978] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.469981] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.488934] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.493508] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.524779] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.528121] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.552354] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.556048] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.602885] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.615446] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.640470] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.644835] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.708625] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.714947] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.775969] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.783225] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.812613] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.816840] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.865653] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.869732] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.898915] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.901706] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.947699] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.953905] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.999597] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3980.002863] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3980.048163] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3980.053085] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3980.101927] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3980.106935] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3980.157233] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3980.161635] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3980.203152] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3980.213950] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3980.245797] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3980.251124] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3980.283578] ok 11 - snd_soc_tplg_test_load_pcm_tplg_reload_card [ 3980.283597] ok 16 - snd_soc_tplg_test [ 3980.539074] # Subtest: soc-utils [ 3980.539090] 1..1 [ 3980.540789] ok 1 - test_tdm_params_to_bclk [ 3980.541252] ok 17 - soc-utils [ 3981.184616] # Subtest: sysctl_test [ 3981.184631] 1..10 [ 3981.186297] ok 1 - sysctl_test_api_dointvec_null_tbl_data [ 3981.187591] ok 2 - sysctl_test_api_dointvec_table_maxlen_unset [ 3981.193306] ok 3 - sysctl_test_api_dointvec_table_len_is_zero [ 3981.199580] ok 4 - sysctl_test_api_dointvec_table_read_but_position_set [ 3981.207835] ok 5 - sysctl_test_dointvec_read_happy_single_positive [ 3981.210926] ok 6 - sysctl_test_dointvec_read_happy_single_negative [ 3981.227510] ok 7 - sysctl_test_dointvec_write_happy_single_positive [ 3981.229665] ok 8 - sysctl_test_dointvec_write_happy_single_negative [ 3981.232516] ok 9 - sysctl_test_api_dointvec_write_single_less_int_min [ 3981.234556] ok 10 - sysctl_test_api_dointvec_write_single_greater_int_max [ 3981.236171] ok 18 - sysctl_test [ 3981.517943] # Subtest: bits-test [ 3981.517959] 1..3 [ 3981.521120] ok 1 - genmask_test [ 3981.526609] ok 2 - genmask_ull_test [ 3981.530641] ok 3 - genmask_input_check_test [ 3981.531404] ok 19 - bits-test [ 3982.646651] # Subtest: kasan [ 3982.646665] 1..55 [ 3982.649589] ================================================================== [ 3982.650929] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 3982.652020] Write of size 1 at addr ffff888104ffc573 by task kunit_try_catch/116226 [ 3982.653037] [ 3982.653284] CPU: 0 PID: 116226 Comm: kunit_try_catch Kdump: loaded Not tainted 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3982.654759] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3982.655539] Call Trace: [ 3982.655907] [ 3982.656215] ? kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 3982.656947] dump_stack_lvl+0x57/0x81 [ 3982.657548] print_address_description.constprop.0+0x1f/0x1e0 [ 3982.658369] ? kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 3982.659096] print_report.cold+0x5c/0x237 [ 3982.659677] kasan_report+0xc9/0x100 [ 3982.660177] ? kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 3982.660912] kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 3982.661631] ? kmalloc_oob_left+0x2e0/0x2e0 [test_kasan] [ 3982.662375] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370 [ 3982.663201] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3982.663959] ? kunit_add_resource+0x197/0x280 [kunit] [ 3982.664654] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.665324] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3982.666008] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.666830] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3982.667532] kthread+0x2a4/0x350 [ 3982.667993] ? kthread_complete_and_exit+0x20/0x20 [ 3982.668652] ret_from_fork+0x1f/0x30 [ 3982.669181] [ 3982.669500] [ 3982.669731] Allocated by task 116226: [ 3982.670243] kasan_save_stack+0x1e/0x40 [ 3982.670776] __kasan_kmalloc+0x81/0xa0 [ 3982.671295] kmalloc_oob_right+0x98/0x510 [test_kasan] [ 3982.671986] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.672651] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.673474] kthread+0x2a4/0x350 [ 3982.673924] ret_from_fork+0x1f/0x30 [ 3982.674430] [ 3982.674660] Last potentially related work creation: [ 3982.675323] kasan_save_stack+0x1e/0x40 [ 3982.675865] __kasan_record_aux_stack+0x96/0xb0 [ 3982.676493] insert_work+0x47/0x310 [ 3982.676985] __queue_work+0x4dd/0xd60 [ 3982.677494] rcu_work_rcufn+0x42/0x70 [ 3982.677997] rcu_do_batch+0x3c2/0xdc0 [ 3982.678522] rcu_core+0x3de/0x5a0 [ 3982.678984] __do_softirq+0x2d0/0x9a8 [ 3982.679519] [ 3982.679748] Second to last potentially related work creation: [ 3982.680524] kasan_save_stack+0x1e/0x40 [ 3982.681049] __kasan_record_aux_stack+0x96/0xb0 [ 3982.681716] call_rcu+0xee/0x890 [ 3982.682322] queue_rcu_work+0x5a/0x70 [ 3982.682853] writeback_sb_inodes+0x373/0xd00 [ 3982.683473] __writeback_inodes_wb+0xb7/0x210 [ 3982.684074] wb_writeback+0x686/0xa10 [ 3982.684586] wb_do_writeback+0x539/0x8a0 [ 3982.685124] wb_workfn+0x12c/0x670 [ 3982.685605] process_one_work+0x8e2/0x1520 [ 3982.686164] worker_thread+0x59e/0xf90 [ 3982.686687] kthread+0x2a4/0x350 [ 3982.687140] ret_from_fork+0x1f/0x30 [ 3982.687640] [ 3982.687873] The buggy address belongs to the object at ffff888104ffc500 [ 3982.687873] which belongs to the cache kmalloc-128 of size 128 [ 3982.689515] The buggy address is located 115 bytes inside of [ 3982.689515] 128-byte region [ffff888104ffc500, ffff888104ffc580) [ 3982.691055] [ 3982.691293] The buggy address belongs to the physical page: [ 3982.692057] page:00000000f421deb9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ffc [ 3982.693358] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 3982.694307] raw: 0017ffffc0000200 ffffea000017cb80 dead000000000005 ffff8881000418c0 [ 3982.695358] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3982.696390] page dumped because: kasan: bad access detected [ 3982.697134] [ 3982.697371] Memory state around the buggy address: [ 3982.698021] ffff888104ffc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 3982.698994] ffff888104ffc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.699960] >ffff888104ffc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 3982.700937] ^ [ 3982.701856] ffff888104ffc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.702826] ffff888104ffc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3982.703792] ================================================================== [ 3982.704890] Disabling lock debugging due to kernel taint [ 3982.705632] ================================================================== [ 3982.706604] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 3982.707690] Write of size 1 at addr ffff888104ffc578 by task kunit_try_catch/116226 [ 3982.708715] [ 3982.708948] CPU: 0 PID: 116226 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3982.710779] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3982.711564] Call Trace: [ 3982.711916] [ 3982.712225] ? kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 3982.712965] dump_stack_lvl+0x57/0x81 [ 3982.713486] print_address_description.constprop.0+0x1f/0x1e0 [ 3982.714275] ? kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 3982.715009] print_report.cold+0x5c/0x237 [ 3982.715572] kasan_report+0xc9/0x100 [ 3982.716073] ? kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 3982.716819] kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 3982.717536] ? kmalloc_oob_left+0x2e0/0x2e0 [test_kasan] [ 3982.718268] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370 [ 3982.719059] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3982.719820] ? kunit_add_resource+0x197/0x280 [kunit] [ 3982.720521] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.721190] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3982.721885] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.722713] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3982.723419] kthread+0x2a4/0x350 [ 3982.723875] ? kthread_complete_and_exit+0x20/0x20 [ 3982.724533] ret_from_fork+0x1f/0x30 [ 3982.725053] [ 3982.725376] [ 3982.725609] Allocated by task 116226: [ 3982.726114] kasan_save_stack+0x1e/0x40 [ 3982.726648] __kasan_kmalloc+0x81/0xa0 [ 3982.727166] kmalloc_oob_right+0x98/0x510 [test_kasan] [ 3982.727871] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.728543] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.729370] kthread+0x2a4/0x350 [ 3982.729822] ret_from_fork+0x1f/0x30 [ 3982.730325] [ 3982.730556] Last potentially related work creation: [ 3982.731220] kasan_save_stack+0x1e/0x40 [ 3982.731758] __kasan_record_aux_stack+0x96/0xb0 [ 3982.732387] insert_work+0x47/0x310 [ 3982.732977] __queue_work+0x4dd/0xd60 [ 3982.733578] rcu_work_rcufn+0x42/0x70 [ 3982.734084] rcu_do_batch+0x3c2/0xdc0 [ 3982.734594] rcu_core+0x3de/0x5a0 [ 3982.735057] __do_softirq+0x2d0/0x9a8 [ 3982.735571] [ 3982.735801] Second to last potentially related work creation: [ 3982.736579] kasan_save_stack+0x1e/0x40 [ 3982.737107] __kasan_record_aux_stack+0x96/0xb0 [ 3982.737744] call_rcu+0xee/0x890 [ 3982.738195] queue_rcu_work+0x5a/0x70 [ 3982.738708] writeback_sb_inodes+0x373/0xd00 [ 3982.739303] __writeback_inodes_wb+0xb7/0x210 [ 3982.739904] wb_writeback+0x686/0xa10 [ 3982.740415] wb_do_writeback+0x539/0x8a0 [ 3982.740953] wb_workfn+0x12c/0x670 [ 3982.741433] process_one_work+0x8e2/0x1520 [ 3982.741991] worker_thread+0x59e/0xf90 [ 3982.742514] kthread+0x2a4/0x350 [ 3982.742967] ret_from_fork+0x1f/0x30 [ 3982.743469] [ 3982.743701] The buggy address belongs to the object at ffff888104ffc500 [ 3982.743701] which belongs to the cache kmalloc-128 of size 128 [ 3982.745359] The buggy address is located 120 bytes inside of [ 3982.745359] 128-byte region [ffff888104ffc500, ffff888104ffc580) [ 3982.746928] [ 3982.747166] The buggy address belongs to the physical page: [ 3982.747923] page:00000000f421deb9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ffc [ 3982.749177] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 3982.750114] raw: 0017ffffc0000200 ffffea000017cb80 dead000000000005 ffff8881000418c0 [ 3982.751150] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3982.752186] page dumped because: kasan: bad access detected [ 3982.752936] [ 3982.753167] Memory state around the buggy address: [ 3982.753821] ffff888104ffc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 3982.754791] ffff888104ffc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.755760] >ffff888104ffc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 3982.756726] ^ [ 3982.757687] ffff888104ffc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.758656] ffff888104ffc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3982.759621] ================================================================== [ 3982.760936] ================================================================== [ 3982.762392] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 3982.763997] Read of size 1 at addr ffff888104ffc580 by task kunit_try_catch/116226 [ 3982.765503] [ 3982.765833] CPU: 0 PID: 116226 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3982.768509] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3982.769656] Call Trace: [ 3982.770170] [ 3982.770632] ? kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 3982.771722] dump_stack_lvl+0x57/0x81 [ 3982.772493] print_address_description.constprop.0+0x1f/0x1e0 [ 3982.773676] ? kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 3982.774794] print_report.cold+0x5c/0x237 [ 3982.775617] kasan_report+0xc9/0x100 [ 3982.776363] ? kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 3982.777436] kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 3982.778480] ? kmalloc_oob_left+0x2e0/0x2e0 [test_kasan] [ 3982.779554] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370 [ 3982.780700] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3982.781807] ? kunit_add_resource+0x197/0x280 [kunit] [ 3982.782826] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.783810] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3982.784818] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.786034] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3982.787054] kthread+0x2a4/0x350 [ 3982.787737] ? kthread_complete_and_exit+0x20/0x20 [ 3982.788712] ret_from_fork+0x1f/0x30 [ 3982.789457] [ 3982.789921] [ 3982.790272] Allocated by task 116226: [ 3982.791006] kasan_save_stack+0x1e/0x40 [ 3982.791785] __kasan_kmalloc+0x81/0xa0 [ 3982.792551] kmalloc_oob_right+0x98/0x510 [test_kasan] [ 3982.793575] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.794561] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.795771] kthread+0x2a4/0x350 [ 3982.796447] ret_from_fork+0x1f/0x30 [ 3982.797179] [ 3982.797525] Last potentially related work creation: [ 3982.798489] kasan_save_stack+0x1e/0x40 [ 3982.799273] __kasan_record_aux_stack+0x96/0xb0 [ 3982.800190] insert_work+0x47/0x310 [ 3982.800905] __queue_work+0x4dd/0xd60 [ 3982.801658] rcu_work_rcufn+0x42/0x70 [ 3982.802380] rcu_do_batch+0x3c2/0xdc0 [ 3982.803092] rcu_core+0x3de/0x5a0 [ 3982.803782] __do_softirq+0x2d0/0x9a8 [ 3982.804534] [ 3982.804877] Second to last potentially related work creation: [ 3982.806029] kasan_save_stack+0x1e/0x40 [ 3982.806823] __kasan_record_aux_stack+0x96/0xb0 [ 3982.807752] call_rcu+0xee/0x890 [ 3982.808433] queue_rcu_work+0x5a/0x70 [ 3982.809175] writeback_sb_inodes+0x373/0xd00 [ 3982.810048] __writeback_inodes_wb+0xb7/0x210 [ 3982.810952] wb_writeback+0x686/0xa10 [ 3982.811701] wb_do_writeback+0x539/0x8a0 [ 3982.812510] wb_workfn+0x12c/0x670 [ 3982.813213] process_one_work+0x8e2/0x1520 [ 3982.814054] worker_thread+0x59e/0xf90 [ 3982.814826] kthread+0x2a4/0x350 [ 3982.815515] ret_from_fork+0x1f/0x30 [ 3982.816260] [ 3982.816619] The buggy address belongs to the object at ffff888104ffc500 [ 3982.816619] which belongs to the cache kmalloc-128 of size 128 [ 3982.819045] The buggy address is located 0 bytes to the right of [ 3982.819045] 128-byte region [ffff888104ffc500, ffff888104ffc580) [ 3982.821388] [ 3982.821720] The buggy address belongs to the physical page: [ 3982.822825] page:00000000f421deb9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ffc [ 3982.824679] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 3982.826058] raw: 0017ffffc0000200 ffffea000017cb80 dead000000000005 ffff8881000418c0 [ 3982.827583] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3982.829100] page dumped because: kasan: bad access detected [ 3982.830202] [ 3982.830558] Memory state around the buggy address: [ 3982.831524] ffff888104ffc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.832945] ffff888104ffc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 3982.834373] >ffff888104ffc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.835800] ^ [ 3982.836479] ffff888104ffc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3982.837881] ffff888104ffc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.839300] ================================================================== [ 3982.840974] ok 1 - kmalloc_oob_right [ 3982.841464] ================================================================== [ 3982.843686] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 3982.845242] Read of size 1 at addr ffff88810833ec3f by task kunit_try_catch/116227 [ 3982.846716] [ 3982.847047] CPU: 0 PID: 116227 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3982.849661] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3982.850797] Call Trace: [ 3982.851317] [ 3982.851765] ? kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 3982.852843] dump_stack_lvl+0x57/0x81 [ 3982.853609] print_address_description.constprop.0+0x1f/0x1e0 [ 3982.854763] ? kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 3982.855784] print_report.cold+0x5c/0x237 [ 3982.856603] kasan_report+0xc9/0x100 [ 3982.857354] ? kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 3982.858421] kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 3982.859452] ? kmalloc_pagealloc_oob_right+0x290/0x290 [test_kasan] [ 3982.860697] ? do_raw_spin_trylock+0xb5/0x180 [ 3982.861593] ? do_raw_spin_lock+0x270/0x270 [ 3982.862455] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3982.863576] ? kunit_add_resource+0x197/0x280 [kunit] [ 3982.864607] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.865607] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3982.866642] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.867885] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3982.868909] kthread+0x2a4/0x350 [ 3982.869541] ? kthread_complete_and_exit+0x20/0x20 [ 3982.870491] ret_from_fork+0x1f/0x30 [ 3982.871263] [ 3982.871725] [ 3982.872068] Allocated by task 1366: [ 3982.872813] kasan_save_stack+0x1e/0x40 [ 3982.873607] __kasan_kmalloc+0x81/0xa0 [ 3982.874379] kmem_alloc+0x91/0x120 [xfs] [ 3982.876235] xfs_iext_insert+0x4e6/0x15f0 [xfs] [ 3982.877502] xfs_bmap_add_extent_hole_real+0x425/0x1d00 [xfs] [ 3982.878956] xfs_bmapi_allocate+0xa6d/0x1380 [xfs] [ 3982.880240] xfs_bmapi_write+0x850/0x1170 [xfs] [ 3982.881479] xfs_alloc_file_space+0x2c6/0x670 [xfs] [ 3982.882778] xfs_file_fallocate+0x89e/0xdd0 [xfs] [ 3982.884044] vfs_fallocate+0x2aa/0xbb0 [ 3982.884817] __x64_sys_fallocate+0xb4/0x100 [ 3982.885661] do_syscall_64+0x59/0x90 [ 3982.886419] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3982.887426] [ 3982.887766] The buggy address belongs to the object at ffff88810833ec20 [ 3982.887766] which belongs to the cache kmalloc-16 of size 16 [ 3982.890159] The buggy address is located 15 bytes to the right of [ 3982.890159] 16-byte region [ffff88810833ec20, ffff88810833ec30) [ 3982.892516] [ 3982.892855] The buggy address belongs to the physical page: [ 3982.893963] page:0000000090a77c2c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10833e [ 3982.895805] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 3982.897188] raw: 0017ffffc0000200 ffffea000427fb80 dead000000000002 ffff8881000413c0 [ 3982.898699] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3982.899762] page dumped because: kasan: bad access detected [ 3982.900521] [ 3982.900769] Memory state around the buggy address: [ 3982.901432] ffff88810833eb00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3982.902420] ffff88810833eb80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3982.903389] >ffff88810833ec00: 00 00 fc fc 00 00 fc fc 00 07 fc fc fb fb fc fc [ 3982.904414] ^ [ 3982.905103] ffff88810833ec80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3982.906077] ffff88810833ed00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3982.907047] ================================================================== [ 3982.908136] ok 2 - kmalloc_oob_left [ 3982.922425] ================================================================== [ 3982.923986] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 3982.925178] Read of size 1 at addr ffff88810866d000 by task kunit_try_catch/116228 [ 3982.926201] [ 3982.926454] CPU: 1 PID: 116228 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3982.928275] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3982.929057] Call Trace: [ 3982.929427] [ 3982.929738] ? kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 3982.930555] dump_stack_lvl+0x57/0x81 [ 3982.931085] print_address_description.constprop.0+0x1f/0x1e0 [ 3982.931874] ? kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 3982.932672] print_report.cold+0x5c/0x237 [ 3982.933226] kasan_report+0xc9/0x100 [ 3982.933732] ? kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 3982.934534] kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 3982.935312] ? pagealloc_uaf+0x2f0/0x2f0 [test_kasan] [ 3982.935999] ? do_raw_spin_trylock+0xb5/0x180 [ 3982.936607] ? do_raw_spin_lock+0x270/0x270 [ 3982.937188] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3982.937955] ? kunit_add_resource+0x197/0x280 [kunit] [ 3982.938686] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.939369] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3982.940058] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.940889] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3982.941593] kthread+0x2a4/0x350 [ 3982.942049] ? kthread_complete_and_exit+0x20/0x20 [ 3982.942710] ret_from_fork+0x1f/0x30 [ 3982.943219] [ 3982.943543] [ 3982.943776] Allocated by task 116228: [ 3982.944288] kasan_save_stack+0x1e/0x40 [ 3982.944817] __kasan_kmalloc+0x81/0xa0 [ 3982.945341] kmalloc_node_oob_right+0x9a/0x2e0 [test_kasan] [ 3982.946139] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.946816] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.947647] kthread+0x2a4/0x350 [ 3982.948101] ret_from_fork+0x1f/0x30 [ 3982.948601] [ 3982.948869] The buggy address belongs to the object at ffff88810866c000 [ 3982.948869] which belongs to the cache kmalloc-4k of size 4096 [ 3982.950505] The buggy address is located 0 bytes to the right of [ 3982.950505] 4096-byte region [ffff88810866c000, ffff88810866d000) [ 3982.952103] [ 3982.952340] The buggy address belongs to the physical page: [ 3982.953150] page:00000000cb63493e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108668 [ 3982.954400] head:00000000cb63493e order:3 compound_mapcount:0 compound_pincount:0 [ 3982.955399] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 3982.956399] raw: 0017ffffc0010200 ffffea00041cd800 dead000000000002 ffff888100042140 [ 3982.957432] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000 [ 3982.958462] page dumped because: kasan: bad access detected [ 3982.959209] [ 3982.959448] Memory state around the buggy address: [ 3982.960177] ffff88810866cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3982.961160] ffff88810866cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3982.962143] >ffff88810866d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.963125] ^ [ 3982.963602] ffff88810866d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.964585] ffff88810866d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.965587] ================================================================== [ 3982.966862] ok 3 - kmalloc_node_oob_right [ 3982.972887] ================================================================== [ 3982.974526] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 3982.975727] Write of size 1 at addr ffff888045dda00a by task kunit_try_catch/116229 [ 3982.976751] [ 3982.976985] CPU: 1 PID: 116229 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3982.978798] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3982.979578] Call Trace: [ 3982.979929] [ 3982.980244] ? kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 3982.981086] dump_stack_lvl+0x57/0x81 [ 3982.981607] print_address_description.constprop.0+0x1f/0x1e0 [ 3982.982393] ? kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 3982.983244] print_report.cold+0x5c/0x237 [ 3982.983797] kasan_report+0xc9/0x100 [ 3982.984302] ? kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 3982.985145] kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 3982.985976] ? kmalloc_pagealloc_uaf+0x280/0x280 [test_kasan] [ 3982.986763] ? do_raw_spin_trylock+0xb5/0x180 [ 3982.987377] ? do_raw_spin_lock+0x270/0x270 [ 3982.987957] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3982.988728] ? kunit_add_resource+0x197/0x280 [kunit] [ 3982.989430] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.990103] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3982.990797] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.991624] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3982.992331] kthread+0x2a4/0x350 [ 3982.992790] ? kthread_complete_and_exit+0x20/0x20 [ 3982.993450] ret_from_fork+0x1f/0x30 [ 3982.993960] [ 3982.994281] [ 3982.994512] The buggy address belongs to the physical page: [ 3982.995264] page:00000000f7c551e3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45dd8 [ 3982.996499] head:00000000f7c551e3 order:2 compound_mapcount:0 compound_pincount:0 [ 3982.997505] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 3982.998428] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3982.999459] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.000489] page dumped because: kasan: bad access detected [ 3983.001239] [ 3983.001469] Memory state around the buggy address: [ 3983.002117] ffff888045dd9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.003084] ffff888045dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.004055] >ffff888045dda000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.005023] ^ [ 3983.005513] ffff888045dda080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.006500] ffff888045dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.007468] ================================================================== [ 3983.008571] ok 4 - kmalloc_pagealloc_oob_right [ 3983.016280] ================================================================== [ 3983.017955] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 3983.019041] Read of size 1 at addr ffff888045dd8000 by task kunit_try_catch/116230 [ 3983.020052] [ 3983.020290] CPU: 1 PID: 116230 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.022097] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.022877] Call Trace: [ 3983.023225] [ 3983.023539] ? kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 3983.024327] dump_stack_lvl+0x57/0x81 [ 3983.024842] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.025628] ? kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 3983.026415] print_report.cold+0x5c/0x237 [ 3983.026974] kasan_report+0xc9/0x100 [ 3983.027477] ? kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 3983.028261] kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 3983.029013] ? kmalloc_pagealloc_invalid_free+0x250/0x250 [test_kasan] [ 3983.029903] ? do_raw_spin_trylock+0xb5/0x180 [ 3983.030508] ? do_raw_spin_lock+0x270/0x270 [ 3983.031087] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.031849] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.032545] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.033215] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.033909] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.034736] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.035441] kthread+0x2a4/0x350 [ 3983.035897] ? kthread_complete_and_exit+0x20/0x20 [ 3983.036557] ret_from_fork+0x1f/0x30 [ 3983.037067] [ 3983.037390] [ 3983.037623] The buggy address belongs to the physical page: [ 3983.038372] page:00000000f7c551e3 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45dd8 [ 3983.039604] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 3983.040487] raw: 000fffffc0000000 ffffea00004b7008 ffff88810c1ff270 0000000000000000 [ 3983.041519] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 3983.042548] page dumped because: kasan: bad access detected [ 3983.043330] [ 3983.043643] Memory state around the buggy address: [ 3983.044525] ffff888045dd7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.045809] ffff888045dd7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.047076] >ffff888045dd8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.048359] ^ [ 3983.048984] ffff888045dd8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.050312] ffff888045dd8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.051693] ================================================================== [ 3983.053202] ok 5 - kmalloc_pagealloc_uaf [ 3983.055641] ================================================================== [ 3983.057300] BUG: KASAN: double-free or invalid-free in kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 3983.058672] [ 3983.058912] CPU: 0 PID: 116231 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.060776] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.061583] Call Trace: [ 3983.061944] [ 3983.062271] dump_stack_lvl+0x57/0x81 [ 3983.062800] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.063610] print_report.cold+0x5c/0x237 [ 3983.064177] ? kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 3983.065086] ? kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 3983.065994] kasan_report_invalid_free+0x99/0xc0 [ 3983.066658] ? kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 3983.067566] kfree+0x2ab/0x3c0 [ 3983.068017] kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 3983.068907] ? kmalloc_large_oob_right+0x2b0/0x2b0 [test_kasan] [ 3983.069748] ? do_raw_spin_trylock+0xb5/0x180 [ 3983.070377] ? do_raw_spin_lock+0x270/0x270 [ 3983.070975] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.071763] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.072481] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.073171] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.073892] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.074749] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.075479] kthread+0x2a4/0x350 [ 3983.075949] ? kthread_complete_and_exit+0x20/0x20 [ 3983.076624] ret_from_fork+0x1f/0x30 [ 3983.077149] [ 3983.077485] [ 3983.077725] The buggy address belongs to the physical page: [ 3983.078496] page:000000003916311f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47f80 [ 3983.079767] head:000000003916311f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.080800] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.081750] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.082819] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.083880] page dumped because: kasan: bad access detected [ 3983.084652] [ 3983.084890] Memory state around the buggy address: [ 3983.085582] ffff888047f7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.086594] ffff888047f7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.087595] >ffff888047f80000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.088587] ^ [ 3983.089054] ffff888047f80080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.090061] ffff888047f80100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.091065] ================================================================== [ 3983.095731] ok 6 - kmalloc_pagealloc_invalid_free [ 3983.097359] ok 7 - pagealloc_oob_right # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 3983.105065] ================================================================== [ 3983.107199] BUG: KASAN: use-after-free in pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 3983.108238] Read of size 1 at addr ffff888015140000 by task kunit_try_catch/116233 [ 3983.109277] [ 3983.109516] CPU: 0 PID: 116233 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.111379] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.112176] Call Trace: [ 3983.112545] [ 3983.112862] ? pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 3983.113576] dump_stack_lvl+0x57/0x81 [ 3983.114104] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.114919] ? pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 3983.115636] print_report.cold+0x5c/0x237 [ 3983.116210] kasan_report+0xc9/0x100 [ 3983.116732] ? pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 3983.117450] pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 3983.118142] ? krealloc_more_oob+0x10/0x10 [test_kasan] [ 3983.118883] ? do_raw_spin_trylock+0xb5/0x180 [ 3983.119512] ? do_raw_spin_lock+0x270/0x270 [ 3983.120110] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.120894] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.121616] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.122308] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.123021] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.123880] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.124609] kthread+0x2a4/0x350 [ 3983.125079] ? kthread_complete_and_exit+0x20/0x20 [ 3983.125763] ret_from_fork+0x1f/0x30 [ 3983.126298] [ 3983.126624] [ 3983.126862] The buggy address belongs to the physical page: [ 3983.127634] page:0000000014d7a338 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x15140 [ 3983.128937] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 3983.129833] raw: 000fffffc0000000 ffffea00011f5008 ffff88813ffd3aa0 0000000000000000 [ 3983.130901] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000 [ 3983.131965] page dumped because: kasan: bad access detected [ 3983.132737] [ 3983.132976] Memory state around the buggy address: [ 3983.133654] ffff88801513ff00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 3983.134650] ffff88801513ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.135644] >ffff888015140000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.136643] ^ [ 3983.137110] ffff888015140080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.138124] ffff888015140100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.139119] ================================================================== [ 3983.143195] ok 8 - pagealloc_uaf [ 3983.151592] ================================================================== [ 3983.153095] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 3983.154402] Write of size 1 at addr ffff88809d645f00 by task kunit_try_catch/116234 [ 3983.155809] [ 3983.156047] CPU: 1 PID: 116234 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.157946] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.158734] Call Trace: [ 3983.159086] [ 3983.159405] ? kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 3983.160212] dump_stack_lvl+0x57/0x81 [ 3983.160734] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.161531] ? kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 3983.162338] print_report.cold+0x5c/0x237 [ 3983.162898] kasan_report+0xc9/0x100 [ 3983.163408] ? kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 3983.164214] kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 3983.165006] ? kmalloc_oob_16+0x3b0/0x3b0 [test_kasan] [ 3983.165707] ? do_raw_spin_trylock+0xb5/0x180 [ 3983.166316] ? do_raw_spin_lock+0x270/0x270 [ 3983.166894] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.167696] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.168407] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.169110] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.169890] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.170724] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.171433] kthread+0x2a4/0x350 [ 3983.171891] ? kthread_complete_and_exit+0x20/0x20 [ 3983.172578] ret_from_fork+0x1f/0x30 [ 3983.173092] [ 3983.173415] [ 3983.173647] Allocated by task 116234: [ 3983.174154] kasan_save_stack+0x1e/0x40 [ 3983.174688] __kasan_kmalloc+0x81/0xa0 [ 3983.175203] kmalloc_large_oob_right+0x98/0x2b0 [test_kasan] [ 3983.175978] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.176649] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.177477] kthread+0x2a4/0x350 [ 3983.177930] ret_from_fork+0x1f/0x30 [ 3983.178435] [ 3983.178667] The buggy address belongs to the object at ffff88809d644000 [ 3983.178667] which belongs to the cache kmalloc-8k of size 8192 [ 3983.180379] The buggy address is located 7936 bytes inside of [ 3983.180379] 8192-byte region [ffff88809d644000, ffff88809d646000) [ 3983.181948] [ 3983.182183] The buggy address belongs to the physical page: [ 3983.182935] page:000000004c8505a6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9d640 [ 3983.184190] head:000000004c8505a6 order:3 compound_mapcount:0 compound_pincount:0 [ 3983.185190] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.186178] raw: 000fffffc0010200 ffffea000008c200 dead000000000005 ffff888100042280 [ 3983.187261] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000 [ 3983.188295] page dumped because: kasan: bad access detected [ 3983.189040] [ 3983.189279] Memory state around the buggy address: [ 3983.189930] ffff88809d645e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.190901] ffff88809d645e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.191873] >ffff88809d645f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.192847] ^ [ 3983.193307] ffff88809d645f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.194275] ffff88809d646000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.195243] ================================================================== [ 3983.196384] ok 9 - kmalloc_large_oob_right [ 3983.203317] ================================================================== [ 3983.204986] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.206183] Write of size 1 at addr ffff88800511e0eb by task kunit_try_catch/116235 [ 3983.207235] [ 3983.207473] CPU: 0 PID: 116235 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.209329] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.210128] Call Trace: [ 3983.210503] [ 3983.210818] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.211659] dump_stack_lvl+0x57/0x81 [ 3983.212190] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.213000] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.213837] print_report.cold+0x5c/0x237 [ 3983.214413] kasan_report+0xc9/0x100 [ 3983.214926] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.215768] krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.216584] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 3983.217320] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.217994] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.218663] ? lock_acquire+0x4ea/0x620 [ 3983.219210] ? rcu_read_unlock+0x40/0x40 [ 3983.219772] ? rcu_read_unlock+0x40/0x40 [ 3983.220343] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.221009] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.221797] ? do_raw_spin_lock+0x270/0x270 [ 3983.222396] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.223254] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.223954] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.224671] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.225368] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.226074] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.226932] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.227658] kthread+0x2a4/0x350 [ 3983.228123] ? kthread_complete_and_exit+0x20/0x20 [ 3983.228809] ret_from_fork+0x1f/0x30 [ 3983.229342] [ 3983.229675] [ 3983.229912] Allocated by task 116235: [ 3983.230441] kasan_save_stack+0x1e/0x40 [ 3983.230982] __kasan_krealloc+0xee/0x160 [ 3983.231543] krealloc+0x50/0xe0 [ 3983.232014] krealloc_more_oob_helper+0x1d5/0x610 [test_kasan] [ 3983.232834] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.233528] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.234381] kthread+0x2a4/0x350 [ 3983.234845] ret_from_fork+0x1f/0x30 [ 3983.235357] [ 3983.235595] The buggy address belongs to the object at ffff88800511e000 [ 3983.235595] which belongs to the cache kmalloc-256 of size 256 [ 3983.237283] The buggy address is located 235 bytes inside of [ 3983.237283] 256-byte region [ffff88800511e000, ffff88800511e100) [ 3983.238874] [ 3983.239112] The buggy address belongs to the physical page: [ 3983.239890] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.241323] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.242356] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.243365] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.244427] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.245488] page dumped because: kasan: bad access detected [ 3983.246260] [ 3983.246498] Memory state around the buggy address: [ 3983.247167] ffff88800511df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.248171] ffff88800511e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.249166] >ffff88800511e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 3983.250160] ^ [ 3983.251067] ffff88800511e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.252059] ffff88800511e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.253050] ================================================================== [ 3983.254257] ================================================================== [ 3983.255261] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.256456] Write of size 1 at addr ffff88800511e0f0 by task kunit_try_catch/116235 [ 3983.257503] [ 3983.257742] CPU: 0 PID: 116235 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.259588] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.260394] Call Trace: [ 3983.260752] [ 3983.261069] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.261907] dump_stack_lvl+0x57/0x81 [ 3983.262443] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.263259] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.264108] print_report.cold+0x5c/0x237 [ 3983.264687] kasan_report+0xc9/0x100 [ 3983.265201] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.266048] krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.266873] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 3983.267609] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.268285] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.268950] ? lock_acquire+0x4ea/0x620 [ 3983.269507] ? rcu_read_unlock+0x40/0x40 [ 3983.270061] ? rcu_read_unlock+0x40/0x40 [ 3983.270627] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.271299] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.272084] ? do_raw_spin_lock+0x270/0x270 [ 3983.272695] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.273552] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.274255] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.274968] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.275660] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.276369] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.277221] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.277939] kthread+0x2a4/0x350 [ 3983.278413] ? kthread_complete_and_exit+0x20/0x20 [ 3983.279085] ret_from_fork+0x1f/0x30 [ 3983.279612] [ 3983.279939] [ 3983.280176] Allocated by task 116235: [ 3983.280705] kasan_save_stack+0x1e/0x40 [ 3983.281256] __kasan_krealloc+0xee/0x160 [ 3983.281810] krealloc+0x50/0xe0 [ 3983.282271] krealloc_more_oob_helper+0x1d5/0x610 [test_kasan] [ 3983.283084] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.283776] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.284623] kthread+0x2a4/0x350 [ 3983.285093] ret_from_fork+0x1f/0x30 [ 3983.285616] [ 3983.285857] The buggy address belongs to the object at ffff88800511e000 [ 3983.285857] which belongs to the cache kmalloc-256 of size 256 [ 3983.287550] The buggy address is located 240 bytes inside of [ 3983.287550] 256-byte region [ffff88800511e000, ffff88800511e100) [ 3983.289137] [ 3983.289385] The buggy address belongs to the physical page: [ 3983.290154] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.291580] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.292612] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.293624] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.294691] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.295749] page dumped because: kasan: bad access detected [ 3983.296525] [ 3983.296774] Memory state around the buggy address: [ 3983.297446] ffff88800511df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.298441] ffff88800511e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.299442] >ffff88800511e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 3983.300438] ^ [ 3983.301380] ffff88800511e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.302395] ffff88800511e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.303396] ================================================================== [ 3983.308961] ok 10 - krealloc_more_oob [ 3983.312599] ================================================================== [ 3983.314220] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.315421] Write of size 1 at addr ffff88800511eec9 by task kunit_try_catch/116236 [ 3983.316472] [ 3983.316713] CPU: 0 PID: 116236 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.318587] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.319404] Call Trace: [ 3983.319773] [ 3983.320099] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.320953] dump_stack_lvl+0x57/0x81 [ 3983.321493] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.322308] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.323149] print_report.cold+0x5c/0x237 [ 3983.323732] kasan_report+0xc9/0x100 [ 3983.324255] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.325096] krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.325927] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.326631] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.327303] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.327968] ? lock_acquire+0x4ea/0x620 [ 3983.328527] ? rcu_read_unlock+0x40/0x40 [ 3983.329089] ? rcu_read_unlock+0x40/0x40 [ 3983.329656] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.330332] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.331115] ? do_raw_spin_lock+0x270/0x270 [ 3983.331718] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.332585] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.333283] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.333996] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.334698] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.335423] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.336288] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.337008] kthread+0x2a4/0x350 [ 3983.337482] ? kthread_complete_and_exit+0x20/0x20 [ 3983.338157] ret_from_fork+0x1f/0x30 [ 3983.338689] [ 3983.339017] [ 3983.339263] Allocated by task 116236: [ 3983.339801] kasan_save_stack+0x1e/0x40 [ 3983.340353] __kasan_krealloc+0xee/0x160 [ 3983.340907] krealloc+0x50/0xe0 [ 3983.341373] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 3983.342186] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.342877] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.343733] kthread+0x2a4/0x350 [ 3983.344214] ret_from_fork+0x1f/0x30 [ 3983.344725] [ 3983.344962] The buggy address belongs to the object at ffff88800511ee00 [ 3983.344962] which belongs to the cache kmalloc-256 of size 256 [ 3983.346653] The buggy address is located 201 bytes inside of [ 3983.346653] 256-byte region [ffff88800511ee00, ffff88800511ef00) [ 3983.348244] [ 3983.348483] The buggy address belongs to the physical page: [ 3983.349256] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.350690] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.351721] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.352737] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.353804] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.354868] page dumped because: kasan: bad access detected [ 3983.355642] [ 3983.355880] Memory state around the buggy address: [ 3983.356557] ffff88800511ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.357556] ffff88800511ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.358554] >ffff88800511ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 3983.359549] ^ [ 3983.360322] ffff88800511ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.361316] ffff88800511ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.362307] ================================================================== [ 3983.363452] ================================================================== [ 3983.364455] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.365651] Write of size 1 at addr ffff88800511eed0 by task kunit_try_catch/116236 [ 3983.366706] [ 3983.366947] CPU: 0 PID: 116236 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.368815] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.369622] Call Trace: [ 3983.369986] [ 3983.370307] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.371137] dump_stack_lvl+0x57/0x81 [ 3983.371670] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.372479] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.373316] print_report.cold+0x5c/0x237 [ 3983.373886] kasan_report+0xc9/0x100 [ 3983.374405] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.375249] krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.376069] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.376771] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.377451] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.378115] ? lock_acquire+0x4ea/0x620 [ 3983.378667] ? rcu_read_unlock+0x40/0x40 [ 3983.379234] ? rcu_read_unlock+0x40/0x40 [ 3983.379787] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.380463] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.381252] ? do_raw_spin_lock+0x270/0x270 [ 3983.381847] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.382707] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.383411] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.384125] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.384832] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.385547] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.386401] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.387119] kthread+0x2a4/0x350 [ 3983.387594] ? kthread_complete_and_exit+0x20/0x20 [ 3983.388278] ret_from_fork+0x1f/0x30 [ 3983.388802] [ 3983.389129] [ 3983.389375] Allocated by task 116236: [ 3983.389897] kasan_save_stack+0x1e/0x40 [ 3983.390450] __kasan_krealloc+0xee/0x160 [ 3983.391002] krealloc+0x50/0xe0 [ 3983.391465] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 3983.392286] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.392975] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.393828] kthread+0x2a4/0x350 [ 3983.394300] ret_from_fork+0x1f/0x30 [ 3983.394813] [ 3983.395052] The buggy address belongs to the object at ffff88800511ee00 [ 3983.395052] which belongs to the cache kmalloc-256 of size 256 [ 3983.396742] The buggy address is located 208 bytes inside of [ 3983.396742] 256-byte region [ffff88800511ee00, ffff88800511ef00) [ 3983.398341] [ 3983.398579] The buggy address belongs to the physical page: [ 3983.399356] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.400778] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.401810] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.402827] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.403898] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.404966] page dumped because: kasan: bad access detected [ 3983.405746] [ 3983.405986] Memory state around the buggy address: [ 3983.406665] ffff88800511ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.407666] ffff88800511ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.408654] >ffff88800511ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 3983.409656] ^ [ 3983.410519] ffff88800511ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.411582] ffff88800511ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.412844] ================================================================== [ 3983.414233] ================================================================== [ 3983.415555] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.417120] Write of size 1 at addr ffff88800511eeda by task kunit_try_catch/116236 [ 3983.418499] [ 3983.418816] CPU: 0 PID: 116236 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.421167] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.422004] Call Trace: [ 3983.422520] [ 3983.422959] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.423983] dump_stack_lvl+0x57/0x81 [ 3983.424685] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.425544] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.426424] print_report.cold+0x5c/0x237 [ 3983.427025] kasan_report+0xc9/0x100 [ 3983.427686] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.428793] krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.429883] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.430816] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.431702] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.432568] ? lock_acquire+0x4ea/0x620 [ 3983.433290] ? rcu_read_unlock+0x40/0x40 [ 3983.434018] ? rcu_read_unlock+0x40/0x40 [ 3983.434750] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.435648] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.436684] ? do_raw_spin_lock+0x270/0x270 [ 3983.437369] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.438330] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.439289] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.440220] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.441022] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.441788] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.442710] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.443568] kthread+0x2a4/0x350 [ 3983.444211] ? kthread_complete_and_exit+0x20/0x20 [ 3983.444917] ret_from_fork+0x1f/0x30 [ 3983.445491] [ 3983.445860] [ 3983.446190] Allocated by task 116236: [ 3983.446880] kasan_save_stack+0x1e/0x40 [ 3983.447595] __kasan_krealloc+0xee/0x160 [ 3983.448331] krealloc+0x50/0xe0 [ 3983.448921] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 3983.449987] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.450899] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.452011] kthread+0x2a4/0x350 [ 3983.452648] ret_from_fork+0x1f/0x30 [ 3983.453318] [ 3983.453631] The buggy address belongs to the object at ffff88800511ee00 [ 3983.453631] which belongs to the cache kmalloc-256 of size 256 [ 3983.455791] The buggy address is located 218 bytes inside of [ 3983.455791] 256-byte region [ffff88800511ee00, ffff88800511ef00) [ 3983.457672] [ 3983.457982] The buggy address belongs to the physical page: [ 3983.458960] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.460534] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.461626] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.462895] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.464052] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.465347] page dumped because: kasan: bad access detected [ 3983.466362] [ 3983.466674] Memory state around the buggy address: [ 3983.467546] ffff88800511ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.468855] ffff88800511ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.470182] >ffff88800511ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 3983.471251] ^ [ 3983.472215] ffff88800511ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.473538] ffff88800511ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.474913] ================================================================== [ 3983.476325] ================================================================== [ 3983.477437] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.478896] Write of size 1 at addr ffff88800511eeea by task kunit_try_catch/116236 [ 3983.480006] [ 3983.480352] CPU: 0 PID: 116236 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.482828] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.483907] Call Trace: [ 3983.484401] [ 3983.484827] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.485796] dump_stack_lvl+0x57/0x81 [ 3983.486483] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.487410] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.488479] print_report.cold+0x5c/0x237 [ 3983.489203] kasan_report+0xc9/0x100 [ 3983.489730] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.490587] krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.491429] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.492154] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.492877] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.493640] ? lock_acquire+0x4ea/0x620 [ 3983.494383] ? rcu_read_unlock+0x40/0x40 [ 3983.495035] ? rcu_read_unlock+0x40/0x40 [ 3983.495620] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.496517] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.497571] ? do_raw_spin_lock+0x270/0x270 [ 3983.498218] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.499399] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.500347] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.501321] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.502270] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.503083] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.503979] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.504751] kthread+0x2a4/0x350 [ 3983.505297] ? kthread_complete_and_exit+0x20/0x20 [ 3983.506225] ret_from_fork+0x1f/0x30 [ 3983.506905] [ 3983.507347] [ 3983.507678] Allocated by task 116236: [ 3983.508406] kasan_save_stack+0x1e/0x40 [ 3983.509140] __kasan_krealloc+0xee/0x160 [ 3983.509890] krealloc+0x50/0xe0 [ 3983.510524] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 3983.511553] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.512273] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.513135] kthread+0x2a4/0x350 [ 3983.513645] ret_from_fork+0x1f/0x30 [ 3983.514177] [ 3983.514496] The buggy address belongs to the object at ffff88800511ee00 [ 3983.514496] which belongs to the cache kmalloc-256 of size 256 [ 3983.516325] The buggy address is located 234 bytes inside of [ 3983.516325] 256-byte region [ffff88800511ee00, ffff88800511ef00) [ 3983.518098] [ 3983.518364] The buggy address belongs to the physical page: [ 3983.519133] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.520606] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.521650] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.522689] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.523764] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.524820] page dumped because: kasan: bad access detected [ 3983.525579] [ 3983.525816] Memory state around the buggy address: [ 3983.526506] ffff88800511ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.527502] ffff88800511ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.528492] >ffff88800511ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 3983.529483] ^ [ 3983.530411] ffff88800511ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.531419] ffff88800511ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.532433] ================================================================== [ 3983.533527] ================================================================== [ 3983.534532] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.535761] Write of size 1 at addr ffff88800511eeeb by task kunit_try_catch/116236 [ 3983.536827] [ 3983.537069] CPU: 0 PID: 116236 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.539129] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.539963] Call Trace: [ 3983.540342] [ 3983.540666] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.541507] dump_stack_lvl+0x57/0x81 [ 3983.542082] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.542899] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.543764] print_report.cold+0x5c/0x237 [ 3983.544357] kasan_report+0xc9/0x100 [ 3983.544874] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.545717] krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.546539] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.547238] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.547918] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.548589] ? lock_acquire+0x4ea/0x620 [ 3983.549134] ? rcu_read_unlock+0x40/0x40 [ 3983.549695] ? rcu_read_unlock+0x40/0x40 [ 3983.550255] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.550920] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.551727] ? do_raw_spin_lock+0x270/0x270 [ 3983.552340] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.553197] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.553894] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.554609] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.555306] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.556025] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.556879] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.557600] kthread+0x2a4/0x350 [ 3983.558071] ? kthread_complete_and_exit+0x20/0x20 [ 3983.558749] ret_from_fork+0x1f/0x30 [ 3983.559285] [ 3983.559625] [ 3983.559864] Allocated by task 116236: [ 3983.560404] kasan_save_stack+0x1e/0x40 [ 3983.560968] __kasan_krealloc+0xee/0x160 [ 3983.561528] krealloc+0x50/0xe0 [ 3983.561973] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 3983.562786] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.563497] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.564352] kthread+0x2a4/0x350 [ 3983.564819] ret_from_fork+0x1f/0x30 [ 3983.565339] [ 3983.565580] The buggy address belongs to the object at ffff88800511ee00 [ 3983.565580] which belongs to the cache kmalloc-256 of size 256 [ 3983.567265] The buggy address is located 235 bytes inside of [ 3983.567265] 256-byte region [ffff88800511ee00, ffff88800511ef00) [ 3983.568896] [ 3983.569136] The buggy address belongs to the physical page: [ 3983.569917] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.571370] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.572408] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.573424] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.574496] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.575590] page dumped because: kasan: bad access detected [ 3983.576711] [ 3983.577082] Memory state around the buggy address: [ 3983.578070] ffff88800511ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.579399] ffff88800511ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.580814] >ffff88800511ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 3983.582114] ^ [ 3983.583302] ffff88800511ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.584599] ffff88800511ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.585904] ================================================================== [ 3983.587346] ok 11 - krealloc_less_oob [ 3983.587758] ================================================================== [ 3983.589840] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.591423] Write of size 1 at addr ffff888047f820eb by task kunit_try_catch/116237 [ 3983.592785] [ 3983.593099] CPU: 0 PID: 116237 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.595542] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.596602] Call Trace: [ 3983.597069] [ 3983.597496] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.598601] dump_stack_lvl+0x57/0x81 [ 3983.599296] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.600359] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.601460] print_report.cold+0x5c/0x237 [ 3983.602219] kasan_report+0xc9/0x100 [ 3983.602893] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.604006] krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.605097] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 3983.606052] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.606920] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.607840] ? lock_acquire+0x4ea/0x620 [ 3983.608676] ? rcu_read_unlock+0x40/0x40 [ 3983.609424] ? rcu_read_unlock+0x40/0x40 [ 3983.610143] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.611107] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.612215] ? do_raw_spin_lock+0x270/0x270 [ 3983.612981] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.614091] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.615001] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.615937] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.616840] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.617771] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.618883] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.619836] kthread+0x2a4/0x350 [ 3983.620474] ? kthread_complete_and_exit+0x20/0x20 [ 3983.621358] ret_from_fork+0x1f/0x30 [ 3983.622042] [ 3983.622476] [ 3983.622785] The buggy address belongs to the physical page: [ 3983.623783] page:000000003916311f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47f80 [ 3983.625443] head:000000003916311f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.626784] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.628021] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.629408] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.630797] page dumped because: kasan: bad access detected [ 3983.631801] [ 3983.632114] Memory state around the buggy address: [ 3983.633005] ffff888047f81f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.634310] ffff888047f82000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.635617] >ffff888047f82080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 3983.636902] ^ [ 3983.638040] ffff888047f82100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.639308] ffff888047f82180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.640605] ================================================================== [ 3983.641999] ================================================================== [ 3983.643308] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.643702] systemd-journald[572]: Data hash table of /run/log/journal/d5d3542be8d8469cb02596ae71801d53/system.journal has a fill level at 75.0 (6997 of 9329 items, 5373952 file size, 768 bytes per hash table item), suggesting rotation. [ 3983.644855] Write of size 1 at addr ffff888047f820f0 by task kunit_try_catch/116237 [ 3983.644863] [ 3983.644868] CPU: 0 PID: 116237 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.647792] systemd-journald[572]: /run/log/journal/d5d3542be8d8469cb02596ae71801d53/system.journal: Journal header limits reached or header out-of-date, rotating. [ 3983.649111] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.649118] Call Trace: [ 3983.649124] [ 3983.656350] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.657593] dump_stack_lvl+0x57/0x81 [ 3983.658298] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.659375] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.660480] print_report.cold+0x5c/0x237 [ 3983.661241] kasan_report+0xc9/0x100 [ 3983.661915] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.663031] krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.664102] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 3983.665054] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.665929] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.666793] ? lock_acquire+0x4ea/0x620 [ 3983.667510] ? rcu_read_unlock+0x40/0x40 [ 3983.668251] ? rcu_read_unlock+0x40/0x40 [ 3983.668977] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.669864] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.670978] ? do_raw_spin_lock+0x270/0x270 [ 3983.671780] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.672913] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.673823] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.674767] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.675667] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.676607] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.677728] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.678692] kthread+0x2a4/0x350 [ 3983.679312] ? kthread_complete_and_exit+0x20/0x20 [ 3983.680199] ret_from_fork+0x1f/0x30 [ 3983.680884] [ 3983.681314] [ 3983.681626] The buggy address belongs to the physical page: [ 3983.682650] page:000000003916311f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47f80 [ 3983.684317] head:000000003916311f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.685662] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.686899] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.688308] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.689760] page dumped because: kasan: bad access detected [ 3983.690923] [ 3983.691304] Memory state around the buggy address: [ 3983.692199] ffff888047f81f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.693506] ffff888047f82000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.694812] >ffff888047f82080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 3983.696119] ^ [ 3983.697356] ffff888047f82100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.698664] ffff888047f82180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.699944] ================================================================== [ 3983.701429] ok 12 - krealloc_pagealloc_more_oob [ 3983.701946] ================================================================== [ 3983.704210] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.705393] Write of size 1 at addr ffff888108e960c9 by task kunit_try_catch/116239 [ 3983.706417] [ 3983.706664] CPU: 0 PID: 116239 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.708486] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.709271] Call Trace: [ 3983.709623] [ 3983.709936] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.710758] dump_stack_lvl+0x57/0x81 [ 3983.711283] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.712070] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.712892] print_report.cold+0x5c/0x237 [ 3983.713458] kasan_report+0xc9/0x100 [ 3983.713960] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.714781] krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.715586] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.716286] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.716933] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.717589] ? lock_acquire+0x4ea/0x620 [ 3983.718123] ? rcu_read_unlock+0x40/0x40 [ 3983.718676] ? rcu_read_unlock+0x40/0x40 [ 3983.719222] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.719870] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.720635] ? do_raw_spin_lock+0x270/0x270 [ 3983.721218] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.722050] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.722729] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.723431] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.724104] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.724801] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.725636] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.726344] kthread+0x2a4/0x350 [ 3983.726802] ? kthread_complete_and_exit+0x20/0x20 [ 3983.727462] ret_from_fork+0x1f/0x30 [ 3983.727974] [ 3983.728302] [ 3983.728534] The buggy address belongs to the physical page: [ 3983.729288] page:00000000df26e75f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108e94 [ 3983.730537] head:00000000df26e75f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.731546] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 3983.732484] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.733520] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.734554] page dumped because: kasan: bad access detected [ 3983.735309] [ 3983.735541] Memory state around the buggy address: [ 3983.736198] ffff888108e95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.737165] ffff888108e96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.738137] >ffff888108e96080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 3983.739108] ^ [ 3983.739862] ffff888108e96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.740835] ffff888108e96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.741805] ================================================================== [ 3983.743006] ================================================================== [ 3983.743986] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.745157] Write of size 1 at addr ffff888108e960d0 by task kunit_try_catch/116239 [ 3983.746209] [ 3983.746443] CPU: 0 PID: 116239 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.748277] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.749061] Call Trace: [ 3983.749421] [ 3983.749732] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.750559] dump_stack_lvl+0x57/0x81 [ 3983.751077] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.751866] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.752690] print_report.cold+0x5c/0x237 [ 3983.753256] kasan_report+0xc9/0x100 [ 3983.753760] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.754581] krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.755388] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.756072] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.756732] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.757384] ? lock_acquire+0x4ea/0x620 [ 3983.757920] ? rcu_read_unlock+0x40/0x40 [ 3983.758468] ? rcu_read_unlock+0x40/0x40 [ 3983.759012] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.759664] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.760428] ? do_raw_spin_lock+0x270/0x270 [ 3983.761006] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.761843] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.762526] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.763228] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.763898] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.764597] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.765432] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.766137] kthread+0x2a4/0x350 [ 3983.766601] ? kthread_complete_and_exit+0x20/0x20 [ 3983.767265] ret_from_fork+0x1f/0x30 [ 3983.767778] [ 3983.768095] [ 3983.768333] The buggy address belongs to the physical page: [ 3983.769082] page:00000000df26e75f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108e94 [ 3983.770337] head:00000000df26e75f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.771344] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 3983.772284] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.773319] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.774355] page dumped because: kasan: bad access detected [ 3983.775105] [ 3983.775344] Memory state around the buggy address: [ 3983.776000] ffff888108e95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.776972] ffff888108e96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.777940] >ffff888108e96080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 3983.778910] ^ [ 3983.779884] ffff888108e96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.781164] ffff888108e96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.782452] ================================================================== [ 3983.783805] ================================================================== [ 3983.785089] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.786645] Write of size 1 at addr ffff888108e960da by task kunit_try_catch/116239 [ 3983.788000] [ 3983.788423] CPU: 0 PID: 116239 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.790635] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.791457] Call Trace: [ 3983.791819] [ 3983.792143] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.792994] dump_stack_lvl+0x57/0x81 [ 3983.793584] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.794542] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.795442] print_report.cold+0x5c/0x237 [ 3983.796021] kasan_report+0xc9/0x100 [ 3983.796549] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.797453] krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.798404] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.799124] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.799881] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.800557] ? lock_acquire+0x4ea/0x620 [ 3983.801105] ? rcu_read_unlock+0x40/0x40 [ 3983.801766] ? rcu_read_unlock+0x40/0x40 [ 3983.802378] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.803201] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.804048] ? do_raw_spin_lock+0x270/0x270 [ 3983.804734] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.805739] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.806448] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.807164] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.807865] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.808583] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.809439] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.810164] kthread+0x2a4/0x350 [ 3983.810643] ? kthread_complete_and_exit+0x20/0x20 [ 3983.811325] ret_from_fork+0x1f/0x30 [ 3983.811852] [ 3983.812186] [ 3983.812426] The buggy address belongs to the physical page: [ 3983.813301] page:00000000df26e75f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108e94 [ 3983.814726] head:00000000df26e75f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.815966] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 3983.817055] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.818249] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.819428] page dumped because: kasan: bad access detected [ 3983.820240] [ 3983.820484] Memory state around the buggy address: [ 3983.821207] ffff888108e95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.822261] ffff888108e96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.823260] >ffff888108e96080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 3983.824315] ^ [ 3983.825447] ffff888108e96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.826644] ffff888108e96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.827646] ================================================================== [ 3983.828712] ================================================================== [ 3983.829716] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.830932] Write of size 1 at addr ffff888108e960ea by task kunit_try_catch/116239 [ 3983.831987] [ 3983.832236] CPU: 0 PID: 116239 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.834094] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.834902] Call Trace: [ 3983.835271] [ 3983.835592] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.836439] dump_stack_lvl+0x57/0x81 [ 3983.836970] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.837817] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.838808] print_report.cold+0x5c/0x237 [ 3983.839495] kasan_report+0xc9/0x100 [ 3983.840015] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.840864] krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.841694] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.842401] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.843136] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.843834] ? lock_acquire+0x4ea/0x620 [ 3983.844400] ? rcu_read_unlock+0x40/0x40 [ 3983.844957] ? rcu_read_unlock+0x40/0x40 [ 3983.845530] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.846214] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.846999] ? do_raw_spin_lock+0x270/0x270 [ 3983.847619] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.848493] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.849194] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.849912] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.850605] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.851324] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.852178] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.852900] kthread+0x2a4/0x350 [ 3983.853386] ? kthread_complete_and_exit+0x20/0x20 [ 3983.854061] ret_from_fork+0x1f/0x30 [ 3983.854593] [ 3983.854918] [ 3983.855156] The buggy address belongs to the physical page: [ 3983.855931] page:00000000df26e75f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108e94 [ 3983.857218] head:00000000df26e75f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.858241] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 3983.859204] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.860268] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.861324] page dumped because: kasan: bad access detected [ 3983.862099] [ 3983.862343] Memory state around the buggy address: [ 3983.863010] ffff888108e95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.864004] ffff888108e96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.864999] >ffff888108e96080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 3983.865995] ^ [ 3983.866906] ffff888108e96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.867899] ffff888108e96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.868925] ================================================================== [ 3983.869986] ================================================================== [ 3983.870989] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.872188] Write of size 1 at addr ffff888108e960eb by task kunit_try_catch/116239 [ 3983.873241] [ 3983.873482] CPU: 0 PID: 116239 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.875348] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.876148] Call Trace: [ 3983.876515] [ 3983.876833] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.877680] dump_stack_lvl+0x57/0x81 [ 3983.878217] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.879025] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.879868] print_report.cold+0x5c/0x237 [ 3983.880446] kasan_report+0xc9/0x100 [ 3983.880962] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.881803] krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.882624] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.883319] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.883987] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.884636] ? lock_acquire+0x4ea/0x620 [ 3983.885173] ? rcu_read_unlock+0x40/0x40 [ 3983.885743] ? rcu_read_unlock+0x40/0x40 [ 3983.886306] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.886973] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.887755] ? do_raw_spin_lock+0x270/0x270 [ 3983.888355] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.889209] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.889905] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.890624] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.891316] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.892024] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.892876] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.893600] kthread+0x2a4/0x350 [ 3983.894067] ? kthread_complete_and_exit+0x20/0x20 [ 3983.894745] ret_from_fork+0x1f/0x30 [ 3983.895273] [ 3983.895597] [ 3983.895845] The buggy address belongs to the physical page: [ 3983.896621] page:00000000df26e75f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108e94 [ 3983.897902] head:00000000df26e75f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.898932] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 3983.899891] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.900953] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.902050] page dumped because: kasan: bad access detected [ 3983.902872] [ 3983.903112] Memory state around the buggy address: [ 3983.903793] ffff888108e95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.904800] ffff888108e96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.905807] >ffff888108e96080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 3983.906810] ^ [ 3983.907730] ffff888108e96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.908728] ffff888108e96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.909730] ================================================================== [ 3983.910886] ok 13 - krealloc_pagealloc_less_oob [ 3983.911250] ================================================================== [ 3983.912949] BUG: KASAN: use-after-free in krealloc_uaf+0x1c7/0x450 [test_kasan] [ 3983.913959] Read of size 1 at addr ffff88800511e800 by task kunit_try_catch/116240 [ 3983.914998] [ 3983.915265] CPU: 0 PID: 116240 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.917119] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.917931] Call Trace: [ 3983.918297] [ 3983.918615] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 3983.919358] dump_stack_lvl+0x57/0x81 [ 3983.919892] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.920703] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 3983.921413] print_report.cold+0x5c/0x237 [ 3983.921985] kasan_report+0xc9/0x100 [ 3983.922506] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 3983.923210] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 3983.923910] __kasan_check_byte+0x36/0x50 [ 3983.924487] krealloc+0x2e/0xe0 [ 3983.924950] krealloc_uaf+0x1c7/0x450 [test_kasan] [ 3983.925631] ? kmalloc_memmove_negative_size+0x290/0x290 [test_kasan] [ 3983.926525] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.927195] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.927873] ? lock_acquire+0x4ea/0x620 [ 3983.928425] ? rcu_read_unlock+0x40/0x40 [ 3983.928982] ? rcu_read_unlock+0x40/0x40 [ 3983.929545] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.930218] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.930999] ? do_raw_spin_lock+0x270/0x270 [ 3983.931599] ? trace_hardirqs_on+0x2d/0x160 [ 3983.932218] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.932926] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.933647] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.934342] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.935055] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.935916] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.936644] kthread+0x2a4/0x350 [ 3983.937114] ? kthread_complete_and_exit+0x20/0x20 [ 3983.937794] ret_from_fork+0x1f/0x30 [ 3983.938326] [ 3983.938653] [ 3983.938892] Allocated by task 116240: [ 3983.939418] kasan_save_stack+0x1e/0x40 [ 3983.939962] __kasan_kmalloc+0x81/0xa0 [ 3983.940498] krealloc_uaf+0xaa/0x450 [test_kasan] [ 3983.941166] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.941852] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.942707] kthread+0x2a4/0x350 [ 3983.943182] ret_from_fork+0x1f/0x30 [ 3983.943694] [ 3983.943931] Freed by task 116240: [ 3983.944412] kasan_save_stack+0x1e/0x40 [ 3983.944951] kasan_set_track+0x21/0x30 [ 3983.945490] kasan_set_free_info+0x20/0x40 [ 3983.946069] __kasan_slab_free+0x108/0x170 [ 3983.946656] slab_free_freelist_hook+0x11d/0x1d0 [ 3983.947320] kfree+0xe2/0x3c0 [ 3983.947757] krealloc_uaf+0x147/0x450 [test_kasan] [ 3983.948440] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.949127] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.949980] kthread+0x2a4/0x350 [ 3983.950458] ret_from_fork+0x1f/0x30 [ 3983.950972] [ 3983.951215] The buggy address belongs to the object at ffff88800511e800 [ 3983.951215] which belongs to the cache kmalloc-256 of size 256 [ 3983.952910] The buggy address is located 0 bytes inside of [ 3983.952910] 256-byte region [ffff88800511e800, ffff88800511e900) [ 3983.954492] [ 3983.954734] The buggy address belongs to the physical page: [ 3983.955511] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x511e [ 3983.956777] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.957815] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.958832] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.959894] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3983.960963] page dumped because: kasan: bad access detected [ 3983.961738] [ 3983.961978] Memory state around the buggy address: [ 3983.962659] ffff88800511e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.963661] ffff88800511e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.964659] >ffff88800511e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3983.965674] ^ [ 3983.966139] ffff88800511e880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3983.967138] ffff88800511e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.968139] ================================================================== [ 3983.969302] ================================================================== [ 3983.970314] BUG: KASAN: use-after-free in krealloc_uaf+0x42e/0x450 [test_kasan] [ 3983.971373] Read of size 1 at addr ffff88800511e800 by task kunit_try_catch/116240 [ 3983.972422] [ 3983.972663] CPU: 0 PID: 116240 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.974536] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.975348] Call Trace: [ 3983.975711] [ 3983.976033] ? krealloc_uaf+0x42e/0x450 [test_kasan] [ 3983.976742] dump_stack_lvl+0x57/0x81 [ 3983.977278] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.978088] ? krealloc_uaf+0x42e/0x450 [test_kasan] [ 3983.978794] print_report.cold+0x5c/0x237 [ 3983.979369] kasan_report+0xc9/0x100 [ 3983.979870] ? krealloc_uaf+0x42e/0x450 [test_kasan] [ 3983.980561] krealloc_uaf+0x42e/0x450 [test_kasan] [ 3983.981240] ? kmalloc_memmove_negative_size+0x290/0x290 [test_kasan] [ 3983.982106] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.982758] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.983407] ? lock_acquire+0x4ea/0x620 [ 3983.983937] ? rcu_read_unlock+0x40/0x40 [ 3983.984491] ? rcu_read_unlock+0x40/0x40 [ 3983.985046] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.985718] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.986498] ? do_raw_spin_lock+0x270/0x270 [ 3983.987089] ? kunit_ptr_not_err_assert_format+0x210/0x210 [kunit] [ 3983.987959] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.988665] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.989387] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.990074] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.990793] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.991645] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.992375] kthread+0x2a4/0x350 [ 3983.992850] ? kthread_complete_and_exit+0x20/0x20 [ 3983.993535] ret_from_fork+0x1f/0x30 [ 3983.994064] [ 3983.994398] [ 3983.994635] Allocated by task 116240: [ 3983.995165] kasan_save_stack+0x1e/0x40 [ 3983.995713] __kasan_kmalloc+0x81/0xa0 [ 3983.996255] krealloc_uaf+0xaa/0x450 [test_kasan] [ 3983.996920] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.997612] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.998465] kthread+0x2a4/0x350 [ 3983.998942] ret_from_fork+0x1f/0x30 [ 3983.999464] [ 3983.999704] Freed by task 116240: [ 3984.000189] kasan_save_stack+0x1e/0x40 [ 3984.000725] kasan_set_track+0x21/0x30 [ 3984.001272] kasan_set_free_info+0x20/0x40 [ 3984.001850] __kasan_slab_free+0x108/0x170 [ 3984.002435] slab_free_freelist_hook+0x11d/0x1d0 [ 3984.003088] kfree+0xe2/0x3c0 [ 3984.003526] krealloc_uaf+0x147/0x450 [test_kasan] [ 3984.004210] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.004901] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.005784] kthread+0x2a4/0x350 [ 3984.006258] ret_from_fork+0x1f/0x30 [ 3984.006772] [ 3984.007014] The buggy address belongs to the object at ffff88800511e800 [ 3984.007014] which belongs to the cache kmalloc-256 of size 256 [ 3984.008710] The buggy address is located 0 bytes inside of [ 3984.008710] 256-byte region [ffff88800511e800, ffff88800511e900) [ 3984.010303] [ 3984.010542] The buggy address belongs to the physical page: [ 3984.011315] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x511e [ 3984.012581] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3984.013652] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.014674] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3984.015737] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3984.016799] page dumped because: kasan: bad access detected [ 3984.017572] [ 3984.017810] Memory state around the buggy address: [ 3984.018503] ffff88800511e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.019503] ffff88800511e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.020505] >ffff88800511e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.021524] ^ [ 3984.021989] ffff88800511e880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.022994] ffff88800511e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.023995] ================================================================== [ 3984.025066] ok 14 - krealloc_uaf [ 3984.025358] ================================================================== [ 3984.026902] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 3984.027985] Write of size 16 at addr ffff8880018eab40 by task kunit_try_catch/116241 [ 3984.029060] [ 3984.029306] CPU: 0 PID: 116241 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.031188] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.031992] Call Trace: [ 3984.032364] [ 3984.032680] ? kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 3984.033409] dump_stack_lvl+0x57/0x81 [ 3984.033946] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.034761] ? kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 3984.035490] print_report.cold+0x5c/0x237 [ 3984.036064] kasan_report+0xc9/0x100 [ 3984.036591] ? kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 3984.037318] kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 3984.038021] ? kmalloc_uaf_16+0x3b0/0x3b0 [test_kasan] [ 3984.038745] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.039376] ? do_raw_spin_lock+0x270/0x270 [ 3984.039972] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.040761] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.041464] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.042183] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.042869] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.043605] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.044456] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.045185] kthread+0x2a4/0x350 [ 3984.045652] ? kthread_complete_and_exit+0x20/0x20 [ 3984.046334] ret_from_fork+0x1f/0x30 [ 3984.046859] [ 3984.047189] [ 3984.047428] Allocated by task 116241: [ 3984.047960] kasan_save_stack+0x1e/0x40 [ 3984.048510] __kasan_kmalloc+0x81/0xa0 [ 3984.049044] kmalloc_oob_16+0xa4/0x3b0 [test_kasan] [ 3984.049736] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.050424] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.051280] kthread+0x2a4/0x350 [ 3984.051748] ret_from_fork+0x1f/0x30 [ 3984.052261] [ 3984.052498] The buggy address belongs to the object at ffff8880018eab40 [ 3984.052498] which belongs to the cache kmalloc-16 of size 16 [ 3984.054170] The buggy address is located 0 bytes inside of [ 3984.054170] 16-byte region [ffff8880018eab40, ffff8880018eab50) [ 3984.055734] [ 3984.055972] The buggy address belongs to the physical page: [ 3984.056747] page:00000000eef87173 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x18ea [ 3984.058005] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.058957] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3984.060023] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3984.061088] page dumped because: kasan: bad access detected [ 3984.061860] [ 3984.062097] Memory state around the buggy address: [ 3984.062782] ffff8880018eaa00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.063776] ffff8880018eaa80: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3984.064772] >ffff8880018eab00: 00 00 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 3984.065772] ^ [ 3984.066548] ffff8880018eab80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.067552] ffff8880018eac00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.068553] ================================================================== [ 3984.069661] ok 15 - kmalloc_oob_16 [ 3984.069968] ================================================================== [ 3984.071551] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 3984.072615] Read of size 16 at addr ffff8880018ead60 by task kunit_try_catch/116242 [ 3984.073667] [ 3984.073907] CPU: 0 PID: 116242 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.075775] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.076577] Call Trace: [ 3984.076943] [ 3984.077262] ? kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 3984.077988] dump_stack_lvl+0x57/0x81 [ 3984.078529] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.079344] ? kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 3984.080069] print_report.cold+0x5c/0x237 [ 3984.080642] kasan_report+0xc9/0x100 [ 3984.081162] ? kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 3984.081880] kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 3984.082587] ? kmalloc_uaf+0x2b0/0x2b0 [test_kasan] [ 3984.083280] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.083901] ? do_raw_spin_lock+0x270/0x270 [ 3984.084504] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.085285] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.085985] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.086701] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.087394] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.088102] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.088953] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.089677] kthread+0x2a4/0x350 [ 3984.090155] ? kthread_complete_and_exit+0x20/0x20 [ 3984.090833] ret_from_fork+0x1f/0x30 [ 3984.091363] [ 3984.091689] [ 3984.091931] Allocated by task 116242: [ 3984.092455] kasan_save_stack+0x1e/0x40 [ 3984.092999] __kasan_kmalloc+0x81/0xa0 [ 3984.093533] kmalloc_uaf_16+0x15d/0x3b0 [test_kasan] [ 3984.094236] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.094917] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.095768] kthread+0x2a4/0x350 [ 3984.096238] ret_from_fork+0x1f/0x30 [ 3984.096751] [ 3984.096987] Freed by task 116242: [ 3984.097468] kasan_save_stack+0x1e/0x40 [ 3984.098007] kasan_set_track+0x21/0x30 [ 3984.098541] kasan_set_free_info+0x20/0x40 [ 3984.099132] __kasan_slab_free+0x108/0x170 [ 3984.099713] slab_free_freelist_hook+0x11d/0x1d0 [ 3984.100368] kfree+0xe2/0x3c0 [ 3984.100801] kmalloc_uaf_16+0x1e8/0x3b0 [test_kasan] [ 3984.101501] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.102190] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.103036] kthread+0x2a4/0x350 [ 3984.103508] ret_from_fork+0x1f/0x30 [ 3984.104021] [ 3984.104266] The buggy address belongs to the object at ffff8880018ead60 [ 3984.104266] which belongs to the cache kmalloc-16 of size 16 [ 3984.105933] The buggy address is located 0 bytes inside of [ 3984.105933] 16-byte region [ffff8880018ead60, ffff8880018ead70) [ 3984.107490] [ 3984.107729] The buggy address belongs to the physical page: [ 3984.108507] page:00000000eef87173 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x18ea [ 3984.109816] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.110769] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3984.111832] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3984.112893] page dumped because: kasan: bad access detected [ 3984.113668] [ 3984.113906] Memory state around the buggy address: [ 3984.114582] ffff8880018eac00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.115598] ffff8880018eac80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.116592] >ffff8880018ead00: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3984.117609] ^ [ 3984.118490] ffff8880018ead80: 00 00 fc fc 00 00 fc fc 00 00 fc fc fb fb fc fc [ 3984.119485] ffff8880018eae00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.120481] ================================================================== [ 3984.121805] ok 16 - kmalloc_uaf_16 [ 3984.122226] ================================================================== [ 3984.123814] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 3984.124979] Write of size 128 at addr ffff88800106af00 by task kunit_try_catch/116243 [ 3984.126042] [ 3984.126289] CPU: 0 PID: 116243 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.128146] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.128945] Call Trace: [ 3984.129308] [ 3984.129626] ? kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 3984.130434] dump_stack_lvl+0x57/0x81 [ 3984.130963] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.131781] ? kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 3984.132598] print_report.cold+0x5c/0x237 [ 3984.133175] kasan_report+0xc9/0x100 [ 3984.133690] ? kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 3984.134499] kasan_check_range+0xfd/0x1e0 [ 3984.135085] memset+0x20/0x50 [ 3984.135530] kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 3984.136328] ? kmalloc_oob_memset_2+0x290/0x290 [test_kasan] [ 3984.137124] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.137753] ? do_raw_spin_lock+0x270/0x270 [ 3984.138355] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.139130] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.139829] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.140547] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.141242] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.141953] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.142807] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.143530] kthread+0x2a4/0x350 [ 3984.143999] ? kthread_complete_and_exit+0x20/0x20 [ 3984.144841] ret_from_fork+0x1f/0x30 [ 3984.145547] [ 3984.145979] [ 3984.146308] Allocated by task 116243: [ 3984.146953] kasan_save_stack+0x1e/0x40 [ 3984.147515] __kasan_kmalloc+0x81/0xa0 [ 3984.148066] kmalloc_oob_in_memset+0x9c/0x280 [test_kasan] [ 3984.148847] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.149556] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.150428] kthread+0x2a4/0x350 [ 3984.150908] ret_from_fork+0x1f/0x30 [ 3984.151428] [ 3984.151667] The buggy address belongs to the object at ffff88800106af00 [ 3984.151667] which belongs to the cache kmalloc-128 of size 128 [ 3984.153398] The buggy address is located 0 bytes inside of [ 3984.153398] 128-byte region [ffff88800106af00, ffff88800106af80) [ 3984.154986] [ 3984.155231] The buggy address belongs to the physical page: [ 3984.156014] page:0000000024b36a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a [ 3984.157341] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.158317] raw: 000fffffc0000200 ffffea00009c8e80 dead000000000003 ffff8881000418c0 [ 3984.159394] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3984.160466] page dumped because: kasan: bad access detected [ 3984.161250] [ 3984.161486] Memory state around the buggy address: [ 3984.162200] ffff88800106ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.163210] ffff88800106ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.164223] >ffff88800106af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 3984.165234] ^ [ 3984.166235] ffff88800106af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.167254] ffff88800106b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3984.168267] ================================================================== [ 3984.169472] ok 17 - kmalloc_oob_in_memset [ 3984.169824] ================================================================== [ 3984.171978] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 3984.173495] Write of size 2 at addr ffff88800106a077 by task kunit_try_catch/116244 [ 3984.174860] [ 3984.175146] CPU: 0 PID: 116244 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.177033] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.177833] Call Trace: [ 3984.178210] [ 3984.178531] ? kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 3984.179353] dump_stack_lvl+0x57/0x81 [ 3984.179897] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.180728] ? kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 3984.181542] print_report.cold+0x5c/0x237 [ 3984.182130] kasan_report+0xc9/0x100 [ 3984.182654] ? kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 3984.183474] kasan_check_range+0xfd/0x1e0 [ 3984.184055] memset+0x20/0x50 [ 3984.184500] kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 3984.185297] ? kmalloc_oob_memset_4+0x290/0x290 [test_kasan] [ 3984.186103] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.186729] ? do_raw_spin_lock+0x270/0x270 [ 3984.187339] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.188127] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.188832] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.189561] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.190270] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.190986] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.191834] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.192568] kthread+0x2a4/0x350 [ 3984.193046] ? kthread_complete_and_exit+0x20/0x20 [ 3984.193726] ret_from_fork+0x1f/0x30 [ 3984.194266] [ 3984.194589] [ 3984.194829] Allocated by task 116244: [ 3984.195378] kasan_save_stack+0x1e/0x40 [ 3984.195935] __kasan_kmalloc+0x81/0xa0 [ 3984.196514] kmalloc_oob_memset_2+0x9c/0x290 [test_kasan] [ 3984.197509] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.198413] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.199525] kthread+0x2a4/0x350 [ 3984.200145] ret_from_fork+0x1f/0x30 [ 3984.200825] [ 3984.201149] The buggy address belongs to the object at ffff88800106a000 [ 3984.201149] which belongs to the cache kmalloc-128 of size 128 [ 3984.203358] The buggy address is located 119 bytes inside of [ 3984.203358] 128-byte region [ffff88800106a000, ffff88800106a080) [ 3984.205436] [ 3984.205744] The buggy address belongs to the physical page: [ 3984.206755] page:0000000024b36a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a [ 3984.208403] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.209643] raw: 000fffffc0000200 ffffea00009c8e80 dead000000000003 ffff8881000418c0 [ 3984.210741] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3984.211856] page dumped because: kasan: bad access detected [ 3984.212668] [ 3984.212906] Memory state around the buggy address: [ 3984.213648] ffff888001069f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3984.214726] ffff888001069f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3984.215772] >ffff88800106a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 3984.217059] ^ [ 3984.218087] ffff88800106a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.219084] ffff88800106a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3984.220076] ================================================================== [ 3984.221270] ok 18 - kmalloc_oob_memset_2 [ 3984.221531] ================================================================== [ 3984.223161] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 3984.224307] Write of size 4 at addr ffff88800106ab75 by task kunit_try_catch/116245 [ 3984.225359] [ 3984.225603] CPU: 0 PID: 116245 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.227476] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.228281] Call Trace: [ 3984.228641] [ 3984.228958] ? kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 3984.229757] dump_stack_lvl+0x57/0x81 [ 3984.230291] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.231099] ? kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 3984.231876] print_report.cold+0x5c/0x237 [ 3984.232442] kasan_report+0xc9/0x100 [ 3984.232954] ? kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 3984.233751] kasan_check_range+0xfd/0x1e0 [ 3984.234322] memset+0x20/0x50 [ 3984.234761] kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 3984.235532] ? kmalloc_oob_memset_8+0x290/0x290 [test_kasan] [ 3984.236328] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.236946] ? do_raw_spin_lock+0x270/0x270 [ 3984.237547] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.238329] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.239026] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.239745] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.240441] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.241152] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.242009] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.242735] kthread+0x2a4/0x350 [ 3984.243209] ? kthread_complete_and_exit+0x20/0x20 [ 3984.243878] ret_from_fork+0x1f/0x30 [ 3984.244408] [ 3984.244734] [ 3984.244973] Allocated by task 116245: [ 3984.245497] kasan_save_stack+0x1e/0x40 [ 3984.246039] __kasan_kmalloc+0x81/0xa0 [ 3984.246605] kmalloc_oob_memset_4+0x9c/0x290 [test_kasan] [ 3984.247350] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.248024] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.248859] kthread+0x2a4/0x350 [ 3984.249328] ret_from_fork+0x1f/0x30 [ 3984.249838] [ 3984.250076] The buggy address belongs to the object at ffff88800106ab00 [ 3984.250076] which belongs to the cache kmalloc-128 of size 128 [ 3984.251756] The buggy address is located 117 bytes inside of [ 3984.251756] 128-byte region [ffff88800106ab00, ffff88800106ab80) [ 3984.253302] [ 3984.253539] The buggy address belongs to the physical page: [ 3984.254305] page:0000000024b36a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a [ 3984.255559] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.256507] raw: 000fffffc0000200 ffffea00009c8e80 dead000000000003 ffff8881000418c0 [ 3984.257571] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3984.258635] page dumped because: kasan: bad access detected [ 3984.259449] [ 3984.259702] Memory state around the buggy address: [ 3984.260367] ffff88800106aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3984.261359] ffff88800106aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.262351] >ffff88800106ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 3984.263343] ^ [ 3984.264333] ffff88800106ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.265326] ffff88800106ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.266316] ================================================================== [ 3984.268390] ok 19 - kmalloc_oob_memset_4 [ 3984.269193] ================================================================== [ 3984.270842] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 3984.272000] Write of size 8 at addr ffff88802723a571 by task kunit_try_catch/116246 [ 3984.273064] [ 3984.273312] CPU: 0 PID: 116246 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.275187] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.275999] Call Trace: [ 3984.276367] [ 3984.276686] ? kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 3984.277498] dump_stack_lvl+0x57/0x81 [ 3984.278031] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.278851] ? kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 3984.279658] print_report.cold+0x5c/0x237 [ 3984.280247] kasan_report+0xc9/0x100 [ 3984.280775] ? kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 3984.281586] kasan_check_range+0xfd/0x1e0 [ 3984.282162] memset+0x20/0x50 [ 3984.282603] kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 3984.283387] ? kmalloc_oob_memset_16+0x290/0x290 [test_kasan] [ 3984.284199] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.284865] ? do_raw_spin_lock+0x270/0x270 [ 3984.285478] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.286270] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.286973] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.287706] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.288400] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.289122] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.289981] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.290721] kthread+0x2a4/0x350 [ 3984.291199] ? kthread_complete_and_exit+0x20/0x20 [ 3984.291883] ret_from_fork+0x1f/0x30 [ 3984.292413] [ 3984.292739] [ 3984.292978] Allocated by task 116246: [ 3984.293509] kasan_save_stack+0x1e/0x40 [ 3984.294056] __kasan_kmalloc+0x81/0xa0 [ 3984.294604] kmalloc_oob_memset_8+0x9c/0x290 [test_kasan] [ 3984.295360] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.296053] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.296906] kthread+0x2a4/0x350 [ 3984.297380] ret_from_fork+0x1f/0x30 [ 3984.297906] [ 3984.298146] The buggy address belongs to the object at ffff88802723a500 [ 3984.298146] which belongs to the cache kmalloc-128 of size 128 [ 3984.299844] The buggy address is located 113 bytes inside of [ 3984.299844] 128-byte region [ffff88802723a500, ffff88802723a580) [ 3984.301449] [ 3984.301691] The buggy address belongs to the physical page: [ 3984.302475] page:000000003ebc8d1c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2723a [ 3984.303750] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.304709] raw: 000fffffc0000200 ffffea0000069140 dead000000000002 ffff8881000418c0 [ 3984.305770] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3984.306907] page dumped because: kasan: bad access detected [ 3984.307717] [ 3984.307960] Memory state around the buggy address: [ 3984.308635] ffff88802723a400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.309644] ffff88802723a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.310652] >ffff88802723a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 3984.311649] ^ [ 3984.312639] ffff88802723a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.313648] ffff88802723a600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.314704] ================================================================== [ 3984.315871] ok 20 - kmalloc_oob_memset_8 [ 3984.316147] ================================================================== [ 3984.317813] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 3984.318988] Write of size 16 at addr ffff88802723a169 by task kunit_try_catch/116247 [ 3984.320059] [ 3984.320305] CPU: 0 PID: 116247 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.322189] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.323017] Call Trace: [ 3984.323394] [ 3984.323719] ? kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 3984.324528] dump_stack_lvl+0x57/0x81 [ 3984.325056] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.325879] ? kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 3984.326697] print_report.cold+0x5c/0x237 [ 3984.327277] kasan_report+0xc9/0x100 [ 3984.327791] ? kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 3984.328617] kasan_check_range+0xfd/0x1e0 [ 3984.329189] memset+0x20/0x50 [ 3984.329638] kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 3984.330420] ? kmalloc_uaf_memset+0x280/0x280 [test_kasan] [ 3984.331203] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.331827] ? do_raw_spin_lock+0x270/0x270 [ 3984.332438] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.333231] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.333935] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.334656] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.335360] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.336068] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.336931] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.337657] kthread+0x2a4/0x350 [ 3984.338139] ? kthread_complete_and_exit+0x20/0x20 [ 3984.338816] ret_from_fork+0x1f/0x30 [ 3984.339344] [ 3984.339680] [ 3984.339919] Allocated by task 116247: [ 3984.340443] kasan_save_stack+0x1e/0x40 [ 3984.341002] __kasan_kmalloc+0x81/0xa0 [ 3984.341648] kmalloc_oob_memset_16+0x9c/0x290 [test_kasan] [ 3984.342475] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.343179] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.344040] kthread+0x2a4/0x350 [ 3984.344515] ret_from_fork+0x1f/0x30 [ 3984.345026] [ 3984.345275] The buggy address belongs to the object at ffff88802723a100 [ 3984.345275] which belongs to the cache kmalloc-128 of size 128 [ 3984.346976] The buggy address is located 105 bytes inside of [ 3984.346976] 128-byte region [ffff88802723a100, ffff88802723a180) [ 3984.348580] [ 3984.348820] The buggy address belongs to the physical page: [ 3984.349602] page:000000003ebc8d1c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2723a [ 3984.350874] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.351837] raw: 000fffffc0000200 ffffea0000069140 dead000000000002 ffff8881000418c0 [ 3984.352914] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3984.353987] page dumped because: kasan: bad access detected [ 3984.354767] [ 3984.355004] Memory state around the buggy address: [ 3984.355726] ffff88802723a000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.356741] ffff88802723a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.357749] >ffff88802723a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 3984.358761] ^ [ 3984.359754] ffff88802723a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.360749] ffff88802723a200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.361759] ================================================================== [ 3984.363029] ok 21 - kmalloc_oob_memset_16 [ 3984.363301] ================================================================== [ 3984.364955] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 3984.366248] Read of size 18446744073709551614 at addr ffff88809d22aa84 by task kunit_try_catch/116248 [ 3984.367548] [ 3984.367792] CPU: 0 PID: 116248 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.369684] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.370507] Call Trace: [ 3984.370872] [ 3984.371197] ? kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 3984.372104] dump_stack_lvl+0x57/0x81 [ 3984.372642] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.373459] ? kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 3984.374367] print_report.cold+0x5c/0x237 [ 3984.374941] kasan_report+0xc9/0x100 [ 3984.375462] ? kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 3984.376375] kasan_check_range+0xfd/0x1e0 [ 3984.376942] memmove+0x20/0x60 [ 3984.377420] kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 3984.378297] ? kmalloc_memmove_invalid_size+0x2a0/0x2a0 [test_kasan] [ 3984.379196] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.379824] ? do_raw_spin_lock+0x270/0x270 [ 3984.380432] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.381217] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.381929] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.382648] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.383355] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.384066] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.384926] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.385659] kthread+0x2a4/0x350 [ 3984.386135] ? kthread_complete_and_exit+0x20/0x20 [ 3984.386820] ret_from_fork+0x1f/0x30 [ 3984.387366] [ 3984.387695] [ 3984.387932] Allocated by task 116248: [ 3984.388490] kasan_save_stack+0x1e/0x40 [ 3984.389044] __kasan_kmalloc+0x81/0xa0 [ 3984.389578] kmalloc_memmove_negative_size+0x9c/0x290 [test_kasan] [ 3984.390453] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.391148] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.392012] kthread+0x2a4/0x350 [ 3984.392484] ret_from_fork+0x1f/0x30 [ 3984.393003] [ 3984.393245] The buggy address belongs to the object at ffff88809d22aa80 [ 3984.393245] which belongs to the cache kmalloc-64 of size 64 [ 3984.394913] The buggy address is located 4 bytes inside of [ 3984.394913] 64-byte region [ffff88809d22aa80, ffff88809d22aac0) [ 3984.396477] [ 3984.396714] The buggy address belongs to the physical page: [ 3984.397495] page:000000008f586a5f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9d22a [ 3984.398748] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.399701] raw: 000fffffc0000200 ffffea000229f040 dead000000000006 ffff888100041640 [ 3984.400771] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 3984.401833] page dumped because: kasan: bad access detected [ 3984.402600] [ 3984.402838] Memory state around the buggy address: [ 3984.403518] ffff88809d22a980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.404527] ffff88809d22aa00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3984.405517] >ffff88809d22aa80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.406516] ^ [ 3984.406977] ffff88809d22ab00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.407985] ffff88809d22ab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3984.408993] ================================================================== [ 3984.410102] ok 22 - kmalloc_memmove_negative_size [ 3984.410397] ================================================================== [ 3984.412139] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 3984.413474] Read of size 64 at addr ffff88809d22a604 by task kunit_try_catch/116249 [ 3984.414821] [ 3984.415067] CPU: 0 PID: 116249 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.417246] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.418346] Call Trace: [ 3984.418835] [ 3984.419295] ? kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 3984.420515] dump_stack_lvl+0x57/0x81 [ 3984.421220] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.422045] ? kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 3984.422932] print_report.cold+0x5c/0x237 [ 3984.423514] kasan_report+0xc9/0x100 [ 3984.424028] ? kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 3984.424921] kasan_check_range+0xfd/0x1e0 [ 3984.425500] memmove+0x20/0x60 [ 3984.425949] kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 3984.426814] ? kmalloc_oob_in_memset+0x280/0x280 [test_kasan] [ 3984.427631] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.428262] ? do_raw_spin_lock+0x270/0x270 [ 3984.428857] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.429641] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.430361] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.431048] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.431773] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.432627] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.433352] kthread+0x2a4/0x350 [ 3984.433829] ? kthread_complete_and_exit+0x20/0x20 [ 3984.434512] ret_from_fork+0x1f/0x30 [ 3984.435038] [ 3984.435373] [ 3984.435616] Allocated by task 116249: [ 3984.436147] kasan_save_stack+0x1e/0x40 [ 3984.436691] __kasan_kmalloc+0x81/0xa0 [ 3984.437224] kmalloc_memmove_invalid_size+0xac/0x2a0 [test_kasan] [ 3984.438069] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.438758] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.439611] kthread+0x2a4/0x350 [ 3984.440079] ret_from_fork+0x1f/0x30 [ 3984.440598] [ 3984.440851] The buggy address belongs to the object at ffff88809d22a600 [ 3984.440851] which belongs to the cache kmalloc-64 of size 64 [ 3984.442520] The buggy address is located 4 bytes inside of [ 3984.442520] 64-byte region [ffff88809d22a600, ffff88809d22a640) [ 3984.444084] [ 3984.444327] The buggy address belongs to the physical page: [ 3984.445098] page:000000008f586a5f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9d22a [ 3984.446373] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.447331] raw: 000fffffc0000200 ffffea000229f040 dead000000000006 ffff888100041640 [ 3984.448397] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 3984.449462] page dumped because: kasan: bad access detected [ 3984.450235] [ 3984.450472] Memory state around the buggy address: [ 3984.451149] ffff88809d22a500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.452147] ffff88809d22a580: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.453145] >ffff88809d22a600: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.454139] ^ [ 3984.454873] ffff88809d22a680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.455870] ffff88809d22a700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.456866] ================================================================== [ 3984.458089] ok 23 - kmalloc_memmove_invalid_size [ 3984.458375] ================================================================== [ 3984.460085] BUG: KASAN: use-after-free in kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 3984.461090] Read of size 1 at addr ffff8880018eade8 by task kunit_try_catch/116250 [ 3984.462139] [ 3984.462377] CPU: 0 PID: 116250 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.464244] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.465042] Call Trace: [ 3984.465408] [ 3984.465724] ? kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 3984.466430] dump_stack_lvl+0x57/0x81 [ 3984.466962] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.467781] ? kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 3984.468476] print_report.cold+0x5c/0x237 [ 3984.469053] kasan_report+0xc9/0x100 [ 3984.469575] ? kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 3984.470273] kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 3984.470939] ? kmalloc_uaf2+0x430/0x430 [test_kasan] [ 3984.471635] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.472260] ? do_raw_spin_lock+0x270/0x270 [ 3984.472853] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.473629] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.474348] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.475031] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.475740] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.476589] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.477305] kthread+0x2a4/0x350 [ 3984.477772] ? kthread_complete_and_exit+0x20/0x20 [ 3984.478445] ret_from_fork+0x1f/0x30 [ 3984.478968] [ 3984.479300] [ 3984.479539] Allocated by task 116250: [ 3984.480059] kasan_save_stack+0x1e/0x40 [ 3984.480610] __kasan_kmalloc+0x81/0xa0 [ 3984.481150] kmalloc_uaf+0x98/0x2b0 [test_kasan] [ 3984.481800] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.482486] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.483341] kthread+0x2a4/0x350 [ 3984.483810] ret_from_fork+0x1f/0x30 [ 3984.484327] [ 3984.484564] Freed by task 116250: [ 3984.485041] kasan_save_stack+0x1e/0x40 [ 3984.485766] kasan_set_track+0x21/0x30 [ 3984.486526] kasan_set_free_info+0x20/0x40 [ 3984.487328] __kasan_slab_free+0x108/0x170 [ 3984.488153] slab_free_freelist_hook+0x11d/0x1d0 [ 3984.489088] kfree+0xe2/0x3c0 [ 3984.489706] kmalloc_uaf+0x12b/0x2b0 [test_kasan] [ 3984.490662] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.491645] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.492851] kthread+0x2a4/0x350 [ 3984.493528] ret_from_fork+0x1f/0x30 [ 3984.494283] [ 3984.494624] The buggy address belongs to the object at ffff8880018eade0 [ 3984.494624] which belongs to the cache kmalloc-16 of size 16 [ 3984.497004] The buggy address is located 8 bytes inside of [ 3984.497004] 16-byte region [ffff8880018eade0, ffff8880018eadf0) [ 3984.499261] [ 3984.499605] The buggy address belongs to the physical page: [ 3984.500714] page:00000000eef87173 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x18ea [ 3984.502526] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.503903] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3984.505424] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3984.506951] page dumped because: kasan: bad access detected [ 3984.508057] [ 3984.508420] Memory state around the buggy address: [ 3984.509393] ffff8880018eac80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.510800] ffff8880018ead00: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3984.512247] >ffff8880018ead80: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3984.513681] ^ [ 3984.515005] ffff8880018eae00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.516445] ffff8880018eae80: fa fb fc fc 00 00 fc fc fb fb fc fc 00 00 fc fc [ 3984.517869] ================================================================== [ 3984.519486] ok 24 - kmalloc_uaf [ 3984.520177] ================================================================== [ 3984.522343] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 3984.523886] Write of size 33 at addr ffff88808a7c1100 by task kunit_try_catch/116251 [ 3984.525418] [ 3984.525766] CPU: 0 PID: 116251 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.528433] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.529579] Call Trace: [ 3984.530097] [ 3984.530556] ? kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 3984.531654] dump_stack_lvl+0x57/0x81 [ 3984.532422] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.533587] ? kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 3984.534688] print_report.cold+0x5c/0x237 [ 3984.535521] kasan_report+0xc9/0x100 [ 3984.536273] ? kmalloc_uaf_memset+0xc1/0x280 [test_kasan] [ 3984.537345] ? kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 3984.538448] kasan_check_range+0xfd/0x1e0 [ 3984.539282] memset+0x20/0x50 [ 3984.539890] kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 3984.540976] ? kmem_cache_accounted+0x170/0x170 [test_kasan] [ 3984.542138] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.543021] ? do_raw_spin_lock+0x270/0x270 [ 3984.543882] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.545006] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.546047] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.547058] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.548089] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.549321] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.550367] kthread+0x2a4/0x350 [ 3984.551041] ? kthread_complete_and_exit+0x20/0x20 [ 3984.552027] ret_from_fork+0x1f/0x30 [ 3984.552798] [ 3984.553280] [ 3984.553648] Allocated by task 116251: [ 3984.554423] kasan_save_stack+0x1e/0x40 [ 3984.555212] __kasan_kmalloc+0x81/0xa0 [ 3984.555974] kmalloc_uaf_memset+0x9a/0x280 [test_kasan] [ 3984.557028] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.558045] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.559270] kthread+0x2a4/0x350 [ 3984.559949] ret_from_fork+0x1f/0x30 [ 3984.560694] [ 3984.561042] Freed by task 116251: [ 3984.561739] kasan_save_stack+0x1e/0x40 [ 3984.562517] kasan_set_track+0x21/0x30 [ 3984.563281] kasan_set_free_info+0x20/0x40 [ 3984.564099] __kasan_slab_free+0x108/0x170 [ 3984.564935] slab_free_freelist_hook+0x11d/0x1d0 [ 3984.565891] kfree+0xe2/0x3c0 [ 3984.566517] kmalloc_uaf_memset+0x137/0x280 [test_kasan] [ 3984.567603] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.568590] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.569811] kthread+0x2a4/0x350 [ 3984.570491] ret_from_fork+0x1f/0x30 [ 3984.571238] [ 3984.571581] The buggy address belongs to the object at ffff88808a7c1100 [ 3984.571581] which belongs to the cache kmalloc-64 of size 64 [ 3984.573969] The buggy address is located 0 bytes inside of [ 3984.573969] 64-byte region [ffff88808a7c1100, ffff88808a7c1140) [ 3984.576201] [ 3984.576542] The buggy address belongs to the physical page: [ 3984.577645] page:00000000a4ebc60e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7c1 [ 3984.579438] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.580803] raw: 000fffffc0000200 ffffea000427f980 dead000000000005 ffff888100041640 [ 3984.582335] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 3984.583830] page dumped because: kasan: bad access detected [ 3984.584922] [ 3984.585274] Memory state around the buggy address: [ 3984.586229] ffff88808a7c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3984.587654] ffff88808a7c1080: 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc [ 3984.589081] >ffff88808a7c1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3984.590501] ^ [ 3984.591178] ffff88808a7c1180: 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc [ 3984.592606] ffff88808a7c1200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.594046] ================================================================== [ 3984.595649] ok 25 - kmalloc_uaf_memset [ 3984.596325] ================================================================== [ 3984.598589] BUG: KASAN: use-after-free in kmalloc_uaf2+0x402/0x430 [test_kasan] [ 3984.600055] Read of size 1 at addr ffff88808a7c1f28 by task kunit_try_catch/116252 [ 3984.601566] [ 3984.601912] CPU: 0 PID: 116252 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.604569] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.605740] Call Trace: [ 3984.606272] [ 3984.606723] ? kmalloc_uaf2+0x402/0x430 [test_kasan] [ 3984.607733] dump_stack_lvl+0x57/0x81 [ 3984.608493] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.609526] ? kmalloc_uaf2+0x402/0x430 [test_kasan] [ 3984.610234] print_report.cold+0x5c/0x237 [ 3984.610821] kasan_report+0xc9/0x100 [ 3984.611350] ? kmalloc_uaf2+0x402/0x430 [test_kasan] [ 3984.612052] kmalloc_uaf2+0x402/0x430 [test_kasan] [ 3984.612743] ? kfree_via_page+0x290/0x290 [test_kasan] [ 3984.613466] ? rcu_read_lock_sched_held+0x12/0x80 [ 3984.614135] ? lock_acquire+0x4ea/0x620 [ 3984.614686] ? rcu_read_unlock+0x40/0x40 [ 3984.615252] ? rcu_read_unlock+0x40/0x40 [ 3984.615806] ? rcu_read_lock_sched_held+0x12/0x80 [ 3984.616480] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.617264] ? do_raw_spin_lock+0x270/0x270 [ 3984.617859] ? trace_hardirqs_on+0x2d/0x160 [ 3984.618447] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.619145] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.619863] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.620558] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.621278] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.622137] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.622860] kthread+0x2a4/0x350 [ 3984.623339] ? kthread_complete_and_exit+0x20/0x20 [ 3984.624017] ret_from_fork+0x1f/0x30 [ 3984.624552] [ 3984.624879] [ 3984.625124] Allocated by task 116252: [ 3984.625647] kasan_save_stack+0x1e/0x40 [ 3984.626203] __kasan_kmalloc+0x81/0xa0 [ 3984.626735] kmalloc_uaf2+0xad/0x430 [test_kasan] [ 3984.627404] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.628093] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.628946] kthread+0x2a4/0x350 [ 3984.629421] ret_from_fork+0x1f/0x30 [ 3984.629932] [ 3984.630178] Freed by task 116252: [ 3984.630653] kasan_save_stack+0x1e/0x40 [ 3984.631202] kasan_set_track+0x21/0x30 [ 3984.631735] kasan_set_free_info+0x20/0x40 [ 3984.632316] __kasan_slab_free+0x108/0x170 [ 3984.632892] slab_free_freelist_hook+0x11d/0x1d0 [ 3984.633547] kfree+0xe2/0x3c0 [ 3984.633989] kmalloc_uaf2+0x144/0x430 [test_kasan] [ 3984.634673] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.635416] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.636387] kthread+0x2a4/0x350 [ 3984.637010] ret_from_fork+0x1f/0x30 [ 3984.637593] [ 3984.637832] The buggy address belongs to the object at ffff88808a7c1f00 [ 3984.637832] which belongs to the cache kmalloc-64 of size 64 [ 3984.639681] The buggy address is located 40 bytes inside of [ 3984.639681] 64-byte region [ffff88808a7c1f00, ffff88808a7c1f40) [ 3984.641303] [ 3984.641545] The buggy address belongs to the physical page: [ 3984.642410] page:00000000a4ebc60e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7c1 [ 3984.643981] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.645246] raw: 000fffffc0000200 ffffea000427f980 dead000000000005 ffff888100041640 [ 3984.646418] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 [ 3984.647711] page dumped because: kasan: bad access detected [ 3984.648510] [ 3984.648751] Memory state around the buggy address: [ 3984.649446] ffff88808a7c1e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.650539] ffff88808a7c1e80: 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc [ 3984.651623] >ffff88808a7c1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3984.652667] ^ [ 3984.653312] ffff88808a7c1f80: 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc [ 3984.654303] ffff88808a7c2000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3984.655295] ================================================================== [ 3984.657763] ok 26 - kmalloc_uaf2 [ 3984.659676] ok 27 - kfree_via_page [ 3984.660477] ok 28 - kfree_via_phys [ 3984.661615] ================================================================== [ 3984.663168] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 3984.664252] Read of size 1 at addr ffff8880024efa10 by task kunit_try_catch/116256 [ 3984.665292] [ 3984.665532] CPU: 0 PID: 116256 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.667400] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.668203] Call Trace: [ 3984.668562] [ 3984.668880] ? kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 3984.669607] dump_stack_lvl+0x57/0x81 [ 3984.670146] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.670955] ? kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 3984.671759] print_report.cold+0x5c/0x237 [ 3984.672342] kasan_report+0xc9/0x100 [ 3984.672890] ? kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 3984.673626] kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 3984.674424] ? kmem_cache_double_free+0x280/0x280 [test_kasan] [ 3984.675246] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.675866] ? do_raw_spin_lock+0x270/0x270 [ 3984.676464] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.677258] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.678004] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.678914] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.679803] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.680822] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.681643] kthread+0x2a4/0x350 [ 3984.682232] ? kthread_complete_and_exit+0x20/0x20 [ 3984.682924] ret_from_fork+0x1f/0x30 [ 3984.683626] [ 3984.684091] [ 3984.684378] Allocated by task 116256: [ 3984.684903] kasan_save_stack+0x1e/0x40 [ 3984.685456] __kasan_slab_alloc+0x66/0x80 [ 3984.686025] kmem_cache_alloc+0x161/0x310 [ 3984.686596] kmem_cache_oob+0x121/0x2e0 [test_kasan] [ 3984.687308] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.688036] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.688894] kthread+0x2a4/0x350 [ 3984.689366] ret_from_fork+0x1f/0x30 [ 3984.689877] [ 3984.690121] The buggy address belongs to the object at ffff8880024ef948 [ 3984.690121] which belongs to the cache test_cache of size 200 [ 3984.691810] The buggy address is located 0 bytes to the right of [ 3984.691810] 200-byte region [ffff8880024ef948, ffff8880024efa10) [ 3984.693435] [ 3984.693672] The buggy address belongs to the physical page: [ 3984.694449] page:00000000d619b1fa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x24ef [ 3984.695710] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.696664] raw: 000fffffc0000200 0000000000000000 dead000000000122 ffff888003939dc0 [ 3984.697733] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 3984.698797] page dumped because: kasan: bad access detected [ 3984.699574] [ 3984.699812] Memory state around the buggy address: [ 3984.700490] ffff8880024ef900: fc fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 3984.701490] ffff8880024ef980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3984.702477] >ffff8880024efa00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.703444] ^ [ 3984.703963] ffff8880024efa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.704960] ffff8880024efb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.705953] ================================================================== [ 3984.721046] ok 29 - kmem_cache_oob [ 3985.246494] ok 30 - kmem_cache_accounted [ 3985.254255] ok 31 - kmem_cache_bulk [ 3985.255269] ================================================================== [ 3985.269237] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 3985.270461] Read of size 1 at addr ffffffffc17dc90d by task kunit_try_catch/116260 [ 3985.271489] [ 3985.271724] CPU: 1 PID: 116260 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.273576] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.274369] Call Trace: [ 3985.274721] [ 3985.275053] ? kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 3985.275859] dump_stack_lvl+0x57/0x81 [ 3985.276380] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.277184] ? kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 3985.277993] print_report.cold+0x5c/0x237 [ 3985.278557] kasan_report+0xc9/0x100 [ 3985.279076] ? kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 3985.279883] kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 3985.280661] ? kasan_stack_oob+0x200/0x200 [test_kasan] [ 3985.281392] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.282324] ? do_raw_spin_lock+0x270/0x270 [ 3985.282999] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.283764] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.284473] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.285173] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.285879] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.286709] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.287424] kthread+0x2a4/0x350 [ 3985.287897] ? kthread_complete_and_exit+0x20/0x20 [ 3985.288563] ret_from_fork+0x1f/0x30 [ 3985.289097] [ 3985.289415] [ 3985.289648] The buggy address belongs to the variable: [ 3985.290366] global_array+0xd/0xfffffffffffe5700 [test_kasan] [ 3985.291172] [ 3985.291405] Memory state around the buggy address: [ 3985.292079] ffffffffc17dc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.293065] ffffffffc17dc880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.294044] >ffffffffc17dc900: 00 02 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 3985.295031] ^ [ 3985.295520] ffffffffc17dc980: 02 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 f9 f9 [ 3985.296503] ffffffffc17dca00: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 3985.297488] ================================================================== [ 3985.298667] ok 32 - kasan_global_oob_right [ 3985.301839] ok 33 - kasan_global_oob_left # SKIP Test requires CONFIG_CC_IS_CLANG=y [ 3985.303217] ================================================================== [ 3985.305519] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 3985.306603] Read of size 1 at addr ffffc9000131fe7a by task kunit_try_catch/116262 [ 3985.307635] [ 3985.307885] CPU: 0 PID: 116262 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.309724] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.310515] Call Trace: [ 3985.310887] [ 3985.311201] ? kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 3985.311936] dump_stack_lvl+0x57/0x81 [ 3985.312465] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.313272] ? kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 3985.313994] print_report.cold+0x5c/0x237 [ 3985.314558] kasan_report+0xc9/0x100 [ 3985.315086] ? kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 3985.315810] kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 3985.316509] ? match_all_mem_tag+0x20/0x20 [test_kasan] [ 3985.317240] ? rcu_read_unlock+0x40/0x40 [ 3985.317794] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.318447] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.319076] ? do_raw_spin_lock+0x270/0x270 [ 3985.319653] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.320429] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3985.321128] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.321838] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.322521] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.323245] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.324093] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.324815] kthread+0x2a4/0x350 [ 3985.325280] ? kthread_complete_and_exit+0x20/0x20 [ 3985.325950] ret_from_fork+0x1f/0x30 [ 3985.326469] [ 3985.326803] [ 3985.327041] The buggy address belongs to stack of task kunit_try_catch/116262 [ 3985.328013] and is located at offset 266 in frame: [ 3985.328681] kasan_stack_oob+0x0/0x200 [test_kasan] [ 3985.329368] [ 3985.329600] This frame has 4 objects: [ 3985.330123] [48, 56) 'array' [ 3985.330128] [80, 128) '__assertion' [ 3985.330548] [160, 224) '__assertion' [ 3985.331069] [256, 266) 'stack_array' [ 3985.331575] [ 3985.332333] The buggy address belongs to the virtual mapping at [ 3985.332333] [ffffc90001318000, ffffc90001321000) created by: [ 3985.332333] dup_task_struct+0x5e/0x5a0 [ 3985.334410] [ 3985.334643] The buggy address belongs to the physical page: [ 3985.335418] page:000000000e10f412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x44759 [ 3985.336661] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 3985.337547] raw: 000fffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 3985.338593] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3985.339646] page dumped because: kasan: bad access detected [ 3985.340408] [ 3985.340639] Memory state around the buggy address: [ 3985.341310] ffffc9000131fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 [ 3985.342292] ffffc9000131fd80: f1 f1 f1 f1 00 f2 f2 f2 00 00 00 00 00 00 f2 f2 [ 3985.343281] >ffffc9000131fe00: f2 f2 00 00 00 00 00 00 00 00 f2 f2 f2 f2 00 02 [ 3985.344278] ^ [ 3985.345263] ffffc9000131fe80: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.346248] ffffc9000131ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.347243] ================================================================== [ 3985.348402] ok 34 - kasan_stack_oob [ 3985.348806] ================================================================== [ 3985.350853] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 3985.352413] Read of size 1 at addr ffffc900012efd1f by task kunit_try_catch/116263 [ 3985.353776] [ 3985.354098] CPU: 0 PID: 116263 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.356515] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.357573] Call Trace: [ 3985.358058] [ 3985.358473] ? kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 3985.359418] dump_stack_lvl+0x57/0x81 [ 3985.359954] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.360746] ? kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 3985.361558] print_report.cold+0x5c/0x237 [ 3985.362137] kasan_report+0xc9/0x100 [ 3985.362641] ? kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 3985.363441] kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 3985.364225] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.364894] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.365545] ? lock_acquire+0x4ea/0x620 [ 3985.366102] ? kasan_alloca_oob_right+0x290/0x290 [test_kasan] [ 3985.366917] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.367571] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.368194] ? do_raw_spin_lock+0x270/0x270 [ 3985.368788] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.369558] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3985.370257] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.370968] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.371650] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.372366] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.373224] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.373942] kthread+0x2a4/0x350 [ 3985.374406] ? kthread_complete_and_exit+0x20/0x20 [ 3985.375083] ret_from_fork+0x1f/0x30 [ 3985.375597] [ 3985.375933] [ 3985.376173] The buggy address belongs to stack of task kunit_try_catch/116263 [ 3985.377155] [ 3985.377392] The buggy address belongs to the virtual mapping at [ 3985.377392] [ffffc900012e8000, ffffc900012f1000) created by: [ 3985.377392] dup_task_struct+0x5e/0x5a0 [ 3985.379462] [ 3985.379696] The buggy address belongs to the physical page: [ 3985.380466] page:000000005db04381 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47f3 [ 3985.381720] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 3985.382602] raw: 000fffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 3985.383649] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3985.384702] page dumped because: kasan: bad access detected [ 3985.385474] [ 3985.385707] Memory state around the buggy address: [ 3985.386379] ffffc900012efc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.387363] ffffc900012efc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.388347] >ffffc900012efd00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00 [ 3985.389334] ^ [ 3985.389895] ffffc900012efd80: f1 f1 f1 f1 04 f2 00 f2 f2 f2 00 00 00 00 00 00 [ 3985.390878] ffffc900012efe00: f2 f2 f2 f2 00 00 00 00 00 00 00 00 f3 f3 f3 f3 [ 3985.391861] ================================================================== [ 3985.393089] ok 35 - kasan_alloca_oob_left [ 3985.393494] ================================================================== [ 3985.395626] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 3985.397199] Read of size 1 at addr ffffc9000131fd2a by task kunit_try_catch/116264 [ 3985.398611] [ 3985.398951] CPU: 0 PID: 116264 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.401385] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.402270] Call Trace: [ 3985.402622] [ 3985.402944] ? kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 3985.403746] dump_stack_lvl+0x57/0x81 [ 3985.404276] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.405086] ? kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 3985.405903] print_report.cold+0x5c/0x237 [ 3985.406464] kasan_report+0xc9/0x100 [ 3985.406977] ? kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 3985.407790] kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 3985.408567] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.409240] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.409901] ? lock_acquire+0x4ea/0x620 [ 3985.410440] ? ksize_unpoisons_memory+0x300/0x300 [test_kasan] [ 3985.411248] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.411903] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.412511] ? do_raw_spin_lock+0x270/0x270 [ 3985.413115] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.413884] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3985.414565] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.415276] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.415960] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.416656] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.417498] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.418218] kthread+0x2a4/0x350 [ 3985.418674] ? kthread_complete_and_exit+0x20/0x20 [ 3985.419346] ret_from_fork+0x1f/0x30 [ 3985.419887] [ 3985.420210] [ 3985.420441] The buggy address belongs to stack of task kunit_try_catch/116264 [ 3985.421433] [ 3985.421671] The buggy address belongs to the virtual mapping at [ 3985.421671] [ffffc90001318000, ffffc90001321000) created by: [ 3985.421671] dup_task_struct+0x5e/0x5a0 [ 3985.423732] [ 3985.423976] The buggy address belongs to the physical page: [ 3985.424729] page:000000000e10f412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x44759 [ 3985.425993] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 3985.426876] raw: 000fffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 3985.427925] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3985.428971] page dumped because: kasan: bad access detected [ 3985.429745] [ 3985.429988] Memory state around the buggy address: [ 3985.430645] ffffc9000131fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.431625] ffffc9000131fc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.432614] >ffffc9000131fd00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00 [ 3985.433599] ^ [ 3985.434238] ffffc9000131fd80: f1 f1 f1 f1 04 f2 00 f2 f2 f2 00 00 00 00 00 00 [ 3985.435228] ffffc9000131fe00: f2 f2 f2 f2 00 00 00 00 00 00 00 00 f3 f3 f3 f3 [ 3985.436216] ================================================================== [ 3985.437291] ok 36 - kasan_alloca_oob_right [ 3985.437701] ================================================================== [ 3985.439847] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 3985.441061] Read of size 1 at addr ffff88802723a880 by task kunit_try_catch/116265 [ 3985.442074] [ 3985.442307] CPU: 0 PID: 116265 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.444124] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.444900] Call Trace: [ 3985.445257] [ 3985.445568] ? ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 3985.446365] dump_stack_lvl+0x57/0x81 [ 3985.446879] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.447670] ? ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 3985.448465] print_report.cold+0x5c/0x237 [ 3985.449021] kasan_report+0xc9/0x100 [ 3985.449528] ? ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 3985.450331] ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 3985.451109] ? ksize_uaf+0x4a0/0x4a0 [test_kasan] [ 3985.451759] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.452371] ? do_raw_spin_lock+0x270/0x270 [ 3985.452954] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.453717] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.454422] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.455101] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.455791] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.456628] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.457334] kthread+0x2a4/0x350 [ 3985.457789] ? kthread_complete_and_exit+0x20/0x20 [ 3985.458448] ret_from_fork+0x1f/0x30 [ 3985.458961] [ 3985.459283] [ 3985.459515] Allocated by task 116265: [ 3985.460025] kasan_save_stack+0x1e/0x40 [ 3985.460561] __kasan_kmalloc+0x81/0xa0 [ 3985.461086] ksize_unpoisons_memory+0x9a/0x300 [test_kasan] [ 3985.461835] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.462505] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.463331] kthread+0x2a4/0x350 [ 3985.463783] ret_from_fork+0x1f/0x30 [ 3985.464286] [ 3985.464517] The buggy address belongs to the object at ffff88802723a800 [ 3985.464517] which belongs to the cache kmalloc-128 of size 128 [ 3985.466163] The buggy address is located 0 bytes to the right of [ 3985.466163] 128-byte region [ffff88802723a800, ffff88802723a880) [ 3985.467746] [ 3985.467980] The buggy address belongs to the physical page: [ 3985.468737] page:000000003ebc8d1c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2723a [ 3985.469980] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.470907] raw: 000fffffc0000200 ffffea0000069140 dead000000000002 ffff8881000418c0 [ 3985.471939] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3985.472983] page dumped because: kasan: bad access detected [ 3985.473740] [ 3985.473972] Memory state around the buggy address: [ 3985.474632] ffff88802723a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.475601] ffff88802723a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.476568] >ffff88802723a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.477540] ^ [ 3985.477994] ffff88802723a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.478963] ffff88802723a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.479934] ================================================================== [ 3985.481166] ok 37 - ksize_unpoisons_memory [ 3985.481483] ================================================================== [ 3985.483081] BUG: KASAN: use-after-free in ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 3985.484037] Read of size 1 at addr ffff88802723a300 by task kunit_try_catch/116266 [ 3985.485049] [ 3985.485281] CPU: 0 PID: 116266 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.487091] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.487869] Call Trace: [ 3985.488222] [ 3985.488530] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 3985.489183] dump_stack_lvl+0x57/0x81 [ 3985.489701] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.490492] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 3985.491146] print_report.cold+0x5c/0x237 [ 3985.491711] kasan_report+0xc9/0x100 [ 3985.492217] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 3985.492862] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 3985.493512] __kasan_check_byte+0x36/0x50 [ 3985.494070] ksize+0x1b/0x50 [ 3985.494485] ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 3985.495120] ? kmem_cache_oob+0x2e0/0x2e0 [test_kasan] [ 3985.495822] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.496435] ? do_raw_spin_lock+0x270/0x270 [ 3985.497015] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.497780] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.498486] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.499165] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.499862] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.500696] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.501403] kthread+0x2a4/0x350 [ 3985.501860] ? kthread_complete_and_exit+0x20/0x20 [ 3985.502523] ret_from_fork+0x1f/0x30 [ 3985.503041] [ 3985.503362] [ 3985.503594] Allocated by task 116266: [ 3985.504111] kasan_save_stack+0x1e/0x40 [ 3985.504642] __kasan_kmalloc+0x81/0xa0 [ 3985.505166] ksize_uaf+0x9a/0x4a0 [test_kasan] [ 3985.505783] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.506455] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.507285] kthread+0x2a4/0x350 [ 3985.507741] ret_from_fork+0x1f/0x30 [ 3985.508243] [ 3985.508476] Freed by task 116266: [ 3985.508940] kasan_save_stack+0x1e/0x40 [ 3985.509476] kasan_set_track+0x21/0x30 [ 3985.509994] kasan_set_free_info+0x20/0x40 [ 3985.510563] __kasan_slab_free+0x108/0x170 [ 3985.511130] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.511765] kfree+0xe2/0x3c0 [ 3985.512191] ksize_uaf+0x137/0x4a0 [test_kasan] [ 3985.512818] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.513490] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.514322] kthread+0x2a4/0x350 [ 3985.514776] ret_from_fork+0x1f/0x30 [ 3985.515281] [ 3985.515513] The buggy address belongs to the object at ffff88802723a300 [ 3985.515513] which belongs to the cache kmalloc-128 of size 128 [ 3985.517157] The buggy address is located 0 bytes inside of [ 3985.517157] 128-byte region [ffff88802723a300, ffff88802723a380) [ 3985.518683] [ 3985.518915] The buggy address belongs to the physical page: [ 3985.519677] page:000000003ebc8d1c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2723a [ 3985.520915] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.521841] raw: 000fffffc0000200 ffffea0000069140 dead000000000002 ffff8881000418c0 [ 3985.522876] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3985.523907] page dumped because: kasan: bad access detected [ 3985.524667] [ 3985.524897] Memory state around the buggy address: [ 3985.525556] ffff88802723a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.526527] ffff88802723a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.527499] >ffff88802723a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.528469] ^ [ 3985.528925] ffff88802723a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.529896] ffff88802723a400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.530865] ================================================================== [ 3985.531888] ================================================================== [ 3985.532861] BUG: KASAN: use-after-free in ksize_uaf+0x47d/0x4a0 [test_kasan] [ 3985.533819] Read of size 1 at addr ffff88802723a300 by task kunit_try_catch/116266 [ 3985.534832] [ 3985.535072] CPU: 0 PID: 116266 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.536880] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.537663] Call Trace: [ 3985.538016] [ 3985.538330] ? ksize_uaf+0x47d/0x4a0 [test_kasan] [ 3985.538978] dump_stack_lvl+0x57/0x81 [ 3985.539492] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.540279] ? ksize_uaf+0x47d/0x4a0 [test_kasan] [ 3985.540926] print_report.cold+0x5c/0x237 [ 3985.541492] kasan_report+0xc9/0x100 [ 3985.541993] ? ksize_uaf+0x47d/0x4a0 [test_kasan] [ 3985.542651] ksize_uaf+0x47d/0x4a0 [test_kasan] [ 3985.543285] ? kmem_cache_oob+0x2e0/0x2e0 [test_kasan] [ 3985.543984] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.544593] ? do_raw_spin_lock+0x270/0x270 [ 3985.545179] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.545938] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.546642] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.547320] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.548010] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.548840] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.549545] kthread+0x2a4/0x350 [ 3985.549999] ? kthread_complete_and_exit+0x20/0x20 [ 3985.550659] ret_from_fork+0x1f/0x30 [ 3985.551175] [ 3985.551492] [ 3985.551725] Allocated by task 116266: [ 3985.552234] kasan_save_stack+0x1e/0x40 [ 3985.552764] __kasan_kmalloc+0x81/0xa0 [ 3985.553298] ksize_uaf+0x9a/0x4a0 [test_kasan] [ 3985.553913] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.554586] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.555417] kthread+0x2a4/0x350 [ 3985.555872] ret_from_fork+0x1f/0x30 [ 3985.556375] [ 3985.556609] Freed by task 116266: [ 3985.557092] kasan_save_stack+0x1e/0x40 [ 3985.557621] kasan_set_track+0x21/0x30 [ 3985.558146] kasan_set_free_info+0x20/0x40 [ 3985.558709] __kasan_slab_free+0x108/0x170 [ 3985.559276] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.559910] kfree+0xe2/0x3c0 [ 3985.560338] ksize_uaf+0x137/0x4a0 [test_kasan] [ 3985.560960] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.561636] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.562463] kthread+0x2a4/0x350 [ 3985.562917] ret_from_fork+0x1f/0x30 [ 3985.563420] [ 3985.563656] The buggy address belongs to the object at ffff88802723a300 [ 3985.563656] which belongs to the cache kmalloc-128 of size 128 [ 3985.565297] The buggy address is located 0 bytes inside of [ 3985.565297] 128-byte region [ffff88802723a300, ffff88802723a380) [ 3985.566821] [ 3985.567059] The buggy address belongs to the physical page: [ 3985.567809] page:000000003ebc8d1c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2723a [ 3985.569053] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.569971] raw: 000fffffc0000200 ffffea0000069140 dead000000000002 ffff8881000418c0 [ 3985.571004] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3985.572042] page dumped because: kasan: bad access detected [ 3985.572790] [ 3985.573021] Memory state around the buggy address: [ 3985.573678] ffff88802723a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.574651] ffff88802723a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.575629] >ffff88802723a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.576598] ^ [ 3985.577060] ffff88802723a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.578032] ffff88802723a400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.578998] ================================================================== [ 3985.580118] ================================================================== [ 3985.581100] BUG: KASAN: use-after-free in ksize_uaf+0x470/0x4a0 [test_kasan] [ 3985.582056] Read of size 1 at addr ffff88802723a378 by task kunit_try_catch/116266 [ 3985.583066] [ 3985.583299] CPU: 0 PID: 116266 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.585111] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.585886] Call Trace: [ 3985.586242] [ 3985.586551] ? ksize_uaf+0x470/0x4a0 [test_kasan] [ 3985.587210] dump_stack_lvl+0x57/0x81 [ 3985.587721] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.588513] ? ksize_uaf+0x470/0x4a0 [test_kasan] [ 3985.589171] print_report.cold+0x5c/0x237 [ 3985.589729] kasan_report+0xc9/0x100 [ 3985.590240] ? ksize_uaf+0x470/0x4a0 [test_kasan] [ 3985.590899] ksize_uaf+0x470/0x4a0 [test_kasan] [ 3985.591531] ? kmem_cache_oob+0x2e0/0x2e0 [test_kasan] [ 3985.592235] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.592837] ? do_raw_spin_lock+0x270/0x270 [ 3985.593422] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.594181] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.594874] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.595553] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.596248] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.597080] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.597781] kthread+0x2a4/0x350 [ 3985.598242] ? kthread_complete_and_exit+0x20/0x20 [ 3985.598896] ret_from_fork+0x1f/0x30 [ 3985.599409] [ 3985.599728] [ 3985.599961] Allocated by task 116266: [ 3985.600471] kasan_save_stack+0x1e/0x40 [ 3985.601000] __kasan_kmalloc+0x81/0xa0 [ 3985.601527] ksize_uaf+0x9a/0x4a0 [test_kasan] [ 3985.602147] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.602815] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.603644] kthread+0x2a4/0x350 [ 3985.604103] ret_from_fork+0x1f/0x30 [ 3985.604599] [ 3985.604831] Freed by task 116266: [ 3985.605300] kasan_save_stack+0x1e/0x40 [ 3985.605828] kasan_set_track+0x21/0x30 [ 3985.606352] kasan_set_free_info+0x20/0x40 [ 3985.606916] __kasan_slab_free+0x108/0x170 [ 3985.607482] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.608123] kfree+0xe2/0x3c0 [ 3985.608543] ksize_uaf+0x137/0x4a0 [test_kasan] [ 3985.609169] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.609838] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.610669] kthread+0x2a4/0x350 [ 3985.611130] ret_from_fork+0x1f/0x30 [ 3985.611630] [ 3985.611864] The buggy address belongs to the object at ffff88802723a300 [ 3985.611864] which belongs to the cache kmalloc-128 of size 128 [ 3985.613511] The buggy address is located 120 bytes inside of [ 3985.613511] 128-byte region [ffff88802723a300, ffff88802723a380) [ 3985.615060] [ 3985.615292] The buggy address belongs to the physical page: [ 3985.616051] page:000000003ebc8d1c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2723a [ 3985.617287] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.618212] raw: 000fffffc0000200 ffffea0000069140 dead000000000002 ffff8881000418c0 [ 3985.619248] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3985.620285] page dumped because: kasan: bad access detected [ 3985.621038] [ 3985.621269] Memory state around the buggy address: [ 3985.621919] ffff88802723a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.622894] ffff88802723a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.623862] >ffff88802723a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.624834] ^ [ 3985.625796] ffff88802723a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.626769] ffff88802723a400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.628036] ================================================================== [ 3985.629598] ok 38 - ksize_uaf [ 3985.638442] ================================================================== [ 3985.639953] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x152/0x400 [ 3985.641006] [ 3985.641252] CPU: 1 PID: 116267 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.643136] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.643937] Call Trace: [ 3985.644305] [ 3985.644628] dump_stack_lvl+0x57/0x81 [ 3985.645165] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.645969] print_report.cold+0x5c/0x237 [ 3985.646562] ? kmem_cache_free+0x152/0x400 [ 3985.647149] ? kmem_cache_free+0x152/0x400 [ 3985.647726] kasan_report_invalid_free+0x99/0xc0 [ 3985.648386] ? kmem_cache_free+0x152/0x400 [ 3985.648965] ? kmem_cache_free+0x152/0x400 [ 3985.649547] __kasan_slab_free+0x152/0x170 [ 3985.650133] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.650790] ? kmem_cache_double_free+0x1bd/0x280 [test_kasan] [ 3985.651615] kmem_cache_free+0x152/0x400 [ 3985.652180] kmem_cache_double_free+0x1bd/0x280 [test_kasan] [ 3985.652971] ? kmem_cache_invalid_free+0x280/0x280 [test_kasan] [ 3985.653850] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.654627] ? do_raw_spin_lock+0x270/0x270 [ 3985.655421] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.656466] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3985.657399] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.658358] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.659281] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.660227] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.661360] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.662329] kthread+0x2a4/0x350 [ 3985.662968] ? kthread_complete_and_exit+0x20/0x20 [ 3985.663878] ret_from_fork+0x1f/0x30 [ 3985.664603] [ 3985.665047] [ 3985.665361] Allocated by task 116267: [ 3985.666047] kasan_save_stack+0x1e/0x40 [ 3985.666764] __kasan_slab_alloc+0x66/0x80 [ 3985.667519] kmem_cache_alloc+0x161/0x310 [ 3985.668276] kmem_cache_double_free+0x123/0x280 [test_kasan] [ 3985.669329] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.670239] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.671349] kthread+0x2a4/0x350 [ 3985.671966] ret_from_fork+0x1f/0x30 [ 3985.672648] [ 3985.672962] Freed by task 116267: [ 3985.673597] kasan_save_stack+0x1e/0x40 [ 3985.674321] kasan_set_track+0x21/0x30 [ 3985.675034] kasan_set_free_info+0x20/0x40 [ 3985.675802] __kasan_slab_free+0x108/0x170 [ 3985.676568] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.677437] kmem_cache_free+0x152/0x400 [ 3985.678174] kmem_cache_double_free+0x144/0x280 [test_kasan] [ 3985.679222] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.680131] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.681258] kthread+0x2a4/0x350 [ 3985.681876] ret_from_fork+0x1f/0x30 [ 3985.682565] [ 3985.682885] The buggy address belongs to the object at ffff888048427738 [ 3985.682885] which belongs to the cache test_cache of size 200 [ 3985.685091] The buggy address is located 0 bytes inside of [ 3985.685091] 200-byte region [ffff888048427738, ffff888048427800) [ 3985.687150] [ 3985.687467] The buggy address belongs to the physical page: [ 3985.688482] page:00000000fa30da5c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x48427 [ 3985.690150] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.691412] raw: 000fffffc0000200 0000000000000000 dead000000000122 ffff888008353280 [ 3985.692870] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 3985.694273] page dumped because: kasan: bad access detected [ 3985.695289] [ 3985.695601] Memory state around the buggy address: [ 3985.696618] ffff888048427600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.698073] ffff888048427680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.699495] >ffff888048427700: fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb fb [ 3985.700926] ^ [ 3985.701932] ffff888048427780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.703346] ffff888048427800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.704754] ================================================================== [ 3985.727677] ok 39 - kmem_cache_double_free [ 3985.728583] ================================================================== [ 3985.730978] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x152/0x400 [ 3985.732519] [ 3985.732853] CPU: 1 PID: 116268 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.735469] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.736396] Call Trace: [ 3985.736831] [ 3985.737223] dump_stack_lvl+0x57/0x81 [ 3985.737830] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.738753] print_report.cold+0x5c/0x237 [ 3985.739407] ? kmem_cache_free+0x152/0x400 [ 3985.740058] ? kmem_cache_free+0x152/0x400 [ 3985.740737] kasan_report_invalid_free+0x99/0xc0 [ 3985.741577] ? kmem_cache_free+0x152/0x400 [ 3985.742473] ? kmem_cache_free+0x152/0x400 [ 3985.743336] __kasan_slab_free+0x152/0x170 [ 3985.744038] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.744840] ? kmem_cache_invalid_free+0x1b6/0x280 [test_kasan] [ 3985.745794] kmem_cache_free+0x152/0x400 [ 3985.746446] kmem_cache_invalid_free+0x1b6/0x280 [test_kasan] [ 3985.747371] ? kmem_cache_double_destroy+0x250/0x250 [test_kasan] [ 3985.748589] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.749547] ? do_raw_spin_lock+0x270/0x270 [ 3985.750370] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.751248] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3985.752030] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.752826] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.753594] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.754389] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.755343] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.756150] kthread+0x2a4/0x350 [ 3985.756677] ? kthread_complete_and_exit+0x20/0x20 [ 3985.757432] ret_from_fork+0x1f/0x30 [ 3985.758023] [ 3985.758388] [ 3985.758656] Allocated by task 116268: [ 3985.759244] kasan_save_stack+0x1e/0x40 [ 3985.759854] __kasan_slab_alloc+0x66/0x80 [ 3985.760487] kmem_cache_alloc+0x161/0x310 [ 3985.761127] kmem_cache_invalid_free+0x126/0x280 [test_kasan] [ 3985.762028] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.762788] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.763733] kthread+0x2a4/0x350 [ 3985.764262] ret_from_fork+0x1f/0x30 [ 3985.764831] [ 3985.765103] The buggy address belongs to the object at ffff8880a3b1b948 [ 3985.765103] which belongs to the cache test_cache of size 200 [ 3985.766978] The buggy address is located 1 bytes inside of [ 3985.766978] 200-byte region [ffff8880a3b1b948, ffff8880a3b1ba10) [ 3985.768739] [ 3985.769025] The buggy address belongs to the physical page: [ 3985.769881] page:00000000d5bdb39f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa3b1b [ 3985.771293] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.772351] raw: 000fffffc0000200 0000000000000000 dead000000000122 ffff888048427dc0 [ 3985.773535] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 3985.774714] page dumped because: kasan: bad access detected [ 3985.775569] [ 3985.775834] Memory state around the buggy address: [ 3985.776583] ffff8880a3b1b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.777691] ffff8880a3b1b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.778799] >ffff8880a3b1b900: fc fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 3985.779904] ^ [ 3985.780765] ffff8880a3b1b980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.781874] ffff8880a3b1ba00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.782982] ================================================================== [ 3985.796601] ok 40 - kmem_cache_invalid_free [ 3985.797871] ================================================================== [ 3985.799525] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 3985.800671] Read of size 1 at addr ffff888048427780 by task kunit_try_catch/116269 [ 3985.801688] [ 3985.801924] CPU: 1 PID: 116269 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.803751] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.804537] Call Trace: [ 3985.804892] [ 3985.805209] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 3985.806042] dump_stack_lvl+0x57/0x81 [ 3985.806559] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.807351] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 3985.808183] print_report.cold+0x5c/0x237 [ 3985.808742] kasan_report+0xc9/0x100 [ 3985.809249] ? kmem_cache_free+0x110/0x400 [ 3985.809812] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 3985.810644] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 3985.811480] __kasan_check_byte+0x36/0x50 [ 3985.812039] kmem_cache_destroy+0x21/0x170 [ 3985.812608] kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 3985.813424] ? kmalloc_oob_right+0x510/0x510 [test_kasan] [ 3985.814167] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.814774] ? do_raw_spin_lock+0x270/0x270 [ 3985.815365] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.816132] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.816832] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.817507] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.818205] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.819051] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.819766] kthread+0x2a4/0x350 [ 3985.820247] ? kthread_complete_and_exit+0x20/0x20 [ 3985.820908] ret_from_fork+0x1f/0x30 [ 3985.821432] [ 3985.821751] [ 3985.821984] Allocated by task 116269: [ 3985.822500] kasan_save_stack+0x1e/0x40 [ 3985.823035] __kasan_slab_alloc+0x66/0x80 [ 3985.823584] kmem_cache_alloc+0x161/0x310 [ 3985.824147] kmem_cache_create_usercopy+0x1b9/0x310 [ 3985.824814] kmem_cache_create+0x12/0x20 [ 3985.825358] kmem_cache_double_destroy+0x8d/0x250 [test_kasan] [ 3985.826162] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.826831] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.827666] kthread+0x2a4/0x350 [ 3985.828129] ret_from_fork+0x1f/0x30 [ 3985.828628] [ 3985.828861] Freed by task 116269: [ 3985.829331] kasan_save_stack+0x1e/0x40 [ 3985.829862] kasan_set_track+0x21/0x30 [ 3985.830389] kasan_set_free_info+0x20/0x40 [ 3985.830951] __kasan_slab_free+0x108/0x170 [ 3985.831520] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.832164] kmem_cache_free+0x152/0x400 [ 3985.832703] kobject_cleanup+0x101/0x390 [ 3985.833287] kmem_cache_double_destroy+0x12a/0x250 [test_kasan] [ 3985.834096] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.834763] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.835594] kthread+0x2a4/0x350 [ 3985.836051] ret_from_fork+0x1f/0x30 [ 3985.836549] [ 3985.836781] The buggy address belongs to the object at ffff888048427780 [ 3985.836781] which belongs to the cache kmem_cache of size 240 [ 3985.838422] The buggy address is located 0 bytes inside of [ 3985.838422] 240-byte region [ffff888048427780, ffff888048427870) [ 3985.839953] [ 3985.840193] The buggy address belongs to the physical page: [ 3985.840944] page:00000000fa30da5c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x48427 [ 3985.842188] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.843115] raw: 000fffffc0000200 0000000000000000 dead000000000122 ffff888100041000 [ 3985.844151] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000 [ 3985.845186] page dumped because: kasan: bad access detected [ 3985.845934] [ 3985.846174] Memory state around the buggy address: [ 3985.846828] ffff888048427680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.847805] ffff888048427700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.848776] >ffff888048427780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.849753] ^ [ 3985.850213] ffff888048427800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 3985.851188] ffff888048427880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.852170] ================================================================== [ 3985.853355] ok 41 - kmem_cache_double_destroy [ 3985.854144] ok 42 - kasan_memchr # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 3985.855622] ok 43 - kasan_memcmp # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 3985.857628] ok 44 - kasan_strings # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 3985.860146] ================================================================== [ 3985.863319] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 3985.865269] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3985.866919] [ 3985.867294] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.870038] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.871214] Call Trace: [ 3985.871740] [ 3985.872216] ? kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 3985.873555] dump_stack_lvl+0x57/0x81 [ 3985.874350] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.875535] ? kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 3985.876873] print_report.cold+0x5c/0x237 [ 3985.877735] kasan_report+0xc9/0x100 [ 3985.878512] ? kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 3985.879855] kasan_check_range+0xfd/0x1e0 [ 3985.880717] kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 3985.882049] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3985.883110] ? put_prev_task_fair+0x37/0x70 [ 3985.883990] ? kunit_kfree+0x200/0x200 [kunit] [ 3985.884940] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.885930] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.887093] ? rcu_read_lock_held+0x30/0x50 [ 3985.887972] ? trace_kmalloc+0x3c/0x100 [ 3985.888787] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3985.889790] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3985.890919] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3985.892471] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3985.893660] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.894716] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.895720] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.896767] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.898027] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.899092] kthread+0x2a4/0x350 [ 3985.899781] ? kthread_complete_and_exit+0x20/0x20 [ 3985.900778] ret_from_fork+0x1f/0x30 [ 3985.901512] [ 3985.901958] [ 3985.902317] Allocated by task 116273: [ 3985.903097] kasan_save_stack+0x1e/0x40 [ 3985.903898] __kasan_kmalloc+0x81/0xa0 [ 3985.904706] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3985.905816] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.906744] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.907832] kthread+0x2a4/0x350 [ 3985.908445] ret_from_fork+0x1f/0x30 [ 3985.909122] [ 3985.909432] The buggy address belongs to the object at ffff8880025962e0 [ 3985.909432] which belongs to the cache kmalloc-16 of size 16 [ 3985.911590] The buggy address is located 8 bytes inside of [ 3985.911590] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3985.913615] [ 3985.913931] The buggy address belongs to the physical page: [ 3985.914932] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3985.916568] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.917799] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3985.919190] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3985.920568] page dumped because: kasan: bad access detected [ 3985.921572] [ 3985.921879] Memory state around the buggy address: [ 3985.922755] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3985.924058] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3985.925361] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3985.926645] ^ [ 3985.927819] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3985.929117] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3985.930398] ================================================================== [ 3985.931794] ================================================================== [ 3985.933103] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 3985.934744] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3985.936105] [ 3985.936414] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.938806] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.939854] Call Trace: [ 3985.940332] [ 3985.940747] ? kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 3985.941938] dump_stack_lvl+0x57/0x81 [ 3985.942633] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.943701] ? kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 3985.944893] print_report.cold+0x5c/0x237 [ 3985.945660] kasan_report+0xc9/0x100 [ 3985.946343] ? kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 3985.947420] kasan_check_range+0xfd/0x1e0 [ 3985.947975] kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 3985.949155] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3985.950087] ? put_prev_task_fair+0x37/0x70 [ 3985.950861] ? kunit_kfree+0x200/0x200 [kunit] [ 3985.951707] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.952583] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.953607] ? rcu_read_lock_held+0x30/0x50 [ 3985.954411] ? trace_kmalloc+0x3c/0x100 [ 3985.955138] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3985.956016] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3985.957020] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3985.958360] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3985.959407] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.960360] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.961219] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.961913] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.962743] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.963446] kthread+0x2a4/0x350 [ 3985.963905] ? kthread_complete_and_exit+0x20/0x20 [ 3985.964563] ret_from_fork+0x1f/0x30 [ 3985.965076] [ 3985.965392] [ 3985.965625] Allocated by task 116273: [ 3985.966134] kasan_save_stack+0x1e/0x40 [ 3985.966663] __kasan_kmalloc+0x81/0xa0 [ 3985.967185] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3985.967916] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.968589] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.969417] kthread+0x2a4/0x350 [ 3985.969869] ret_from_fork+0x1f/0x30 [ 3985.970370] [ 3985.970602] The buggy address belongs to the object at ffff8880025962e0 [ 3985.970602] which belongs to the cache kmalloc-16 of size 16 [ 3985.972227] The buggy address is located 8 bytes inside of [ 3985.972227] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3985.973741] [ 3985.973973] The buggy address belongs to the physical page: [ 3985.974724] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3985.975947] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.976869] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3985.977905] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3985.978937] page dumped because: kasan: bad access detected [ 3985.979688] [ 3985.979920] Memory state around the buggy address: [ 3985.980577] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3985.981544] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3985.982516] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3985.983483] ^ [ 3985.984388] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3985.985361] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3985.986329] ================================================================== [ 3985.987340] ================================================================== [ 3985.988315] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 3985.989555] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3985.990580] [ 3985.990821] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.992642] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.993426] Call Trace: [ 3985.993777] [ 3985.994093] ? kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 3985.994982] dump_stack_lvl+0x57/0x81 [ 3985.995503] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.996288] ? kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 3985.997185] print_report.cold+0x5c/0x237 [ 3985.997746] kasan_report+0xc9/0x100 [ 3985.998258] ? kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 3985.999161] kasan_check_range+0xfd/0x1e0 [ 3985.999716] kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 3986.000593] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3986.001291] ? put_prev_task_fair+0x37/0x70 [ 3986.001867] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.002545] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.003229] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.004035] ? rcu_read_lock_held+0x30/0x50 [ 3986.004629] ? trace_kmalloc+0x3c/0x100 [ 3986.005194] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.005855] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3986.006608] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.007615] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.008396] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.009107] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.009817] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.010514] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.011363] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.012083] kthread+0x2a4/0x350 [ 3986.012541] ? kthread_complete_and_exit+0x20/0x20 [ 3986.013204] ret_from_fork+0x1f/0x30 [ 3986.013713] [ 3986.014037] [ 3986.014271] Allocated by task 116273: [ 3986.014775] kasan_save_stack+0x1e/0x40 [ 3986.015309] __kasan_kmalloc+0x81/0xa0 [ 3986.015826] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.016572] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.017242] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.018072] kthread+0x2a4/0x350 [ 3986.018523] ret_from_fork+0x1f/0x30 [ 3986.019026] [ 3986.019286] The buggy address belongs to the object at ffff8880025962e0 [ 3986.019286] which belongs to the cache kmalloc-16 of size 16 [ 3986.020905] The buggy address is located 8 bytes inside of [ 3986.020905] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.022443] [ 3986.022674] The buggy address belongs to the physical page: [ 3986.023437] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.024657] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.025584] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.026617] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.027648] page dumped because: kasan: bad access detected [ 3986.028401] [ 3986.028632] Memory state around the buggy address: [ 3986.029296] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.030277] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.031247] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.032215] ^ [ 3986.033102] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.034071] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.035043] ================================================================== [ 3986.036060] ================================================================== [ 3986.037033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 3986.038299] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.039329] [ 3986.039562] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.041381] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.042160] Call Trace: [ 3986.042513] [ 3986.042822] ? kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 3986.043714] dump_stack_lvl+0x57/0x81 [ 3986.044309] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.045366] ? kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 3986.046566] print_report.cold+0x5c/0x237 [ 3986.047324] kasan_report+0xc9/0x100 [ 3986.048005] ? kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 3986.049202] kasan_check_range+0xfd/0x1e0 [ 3986.049938] kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 3986.051115] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3986.052045] ? put_prev_task_fair+0x37/0x70 [ 3986.052805] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.053638] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.054512] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.055530] ? rcu_read_lock_held+0x30/0x50 [ 3986.056293] ? trace_kmalloc+0x3c/0x100 [ 3986.057009] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.057877] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3986.058671] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.059673] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.060450] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.061149] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.061820] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.062515] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.063360] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.064068] kthread+0x2a4/0x350 [ 3986.064526] ? kthread_complete_and_exit+0x20/0x20 [ 3986.065191] ret_from_fork+0x1f/0x30 [ 3986.065701] [ 3986.066024] [ 3986.066257] Allocated by task 116273: [ 3986.066764] kasan_save_stack+0x1e/0x40 [ 3986.067300] __kasan_kmalloc+0x81/0xa0 [ 3986.067818] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.068555] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.069227] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.070055] kthread+0x2a4/0x350 [ 3986.070509] ret_from_fork+0x1f/0x30 [ 3986.071011] [ 3986.071243] The buggy address belongs to the object at ffff8880025962e0 [ 3986.071243] which belongs to the cache kmalloc-16 of size 16 [ 3986.072866] The buggy address is located 8 bytes inside of [ 3986.072866] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.074383] [ 3986.074614] The buggy address belongs to the physical page: [ 3986.075361] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.076578] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.077500] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.078545] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.079577] page dumped because: kasan: bad access detected [ 3986.080329] [ 3986.080562] Memory state around the buggy address: [ 3986.081220] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.082187] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.083154] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.084124] ^ [ 3986.085012] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.085974] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.086941] ================================================================== [ 3986.087954] ================================================================== [ 3986.088938] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 3986.090180] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.091202] [ 3986.091436] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.093681] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.094726] Call Trace: [ 3986.095205] [ 3986.095622] ? kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 3986.096815] dump_stack_lvl+0x57/0x81 [ 3986.097413] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.098204] ? kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 3986.099096] print_report.cold+0x5c/0x237 [ 3986.099653] kasan_report+0xc9/0x100 [ 3986.100173] ? kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 3986.101067] kasan_check_range+0xfd/0x1e0 [ 3986.101624] kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 3986.102506] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3986.103208] ? put_prev_task_fair+0x37/0x70 [ 3986.103785] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.104407] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.105060] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.105815] ? rcu_read_lock_held+0x30/0x50 [ 3986.106392] ? trace_kmalloc+0x3c/0x100 [ 3986.106923] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.107577] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3986.108318] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.109318] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.110096] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.110788] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.111459] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.112154] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.112988] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.113684] kthread+0x2a4/0x350 [ 3986.114147] ? kthread_complete_and_exit+0x20/0x20 [ 3986.114802] ret_from_fork+0x1f/0x30 [ 3986.115317] [ 3986.115635] [ 3986.115869] Allocated by task 116273: [ 3986.116383] kasan_save_stack+0x1e/0x40 [ 3986.116910] __kasan_kmalloc+0x81/0xa0 [ 3986.117434] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.118168] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.118833] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.119660] kthread+0x2a4/0x350 [ 3986.120116] ret_from_fork+0x1f/0x30 [ 3986.120611] [ 3986.120843] The buggy address belongs to the object at ffff8880025962e0 [ 3986.120843] which belongs to the cache kmalloc-16 of size 16 [ 3986.122465] The buggy address is located 8 bytes inside of [ 3986.122465] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.123985] [ 3986.124217] The buggy address belongs to the physical page: [ 3986.124963] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.126188] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.127111] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.128153] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.129183] page dumped because: kasan: bad access detected [ 3986.129930] [ 3986.130166] Memory state around the buggy address: [ 3986.130815] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.131783] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.132764] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.133730] ^ [ 3986.134616] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.135582] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.136550] ================================================================== [ 3986.137562] ================================================================== [ 3986.138533] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 3986.139765] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.140790] [ 3986.141026] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.142827] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.143815] Call Trace: [ 3986.144298] [ 3986.144715] ? kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 3986.145917] dump_stack_lvl+0x57/0x81 [ 3986.146616] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.147529] ? kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 3986.148465] print_report.cold+0x5c/0x237 [ 3986.149035] kasan_report+0xc9/0x100 [ 3986.149539] ? kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 3986.150441] kasan_check_range+0xfd/0x1e0 [ 3986.151001] kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 3986.151870] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3986.152569] ? put_prev_task_fair+0x37/0x70 [ 3986.153148] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.153765] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.154421] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.155181] ? rcu_read_lock_held+0x30/0x50 [ 3986.155752] ? trace_kmalloc+0x3c/0x100 [ 3986.156288] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.156936] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3986.157672] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.158682] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.159459] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.160162] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.160831] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.161526] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.162358] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.163063] kthread+0x2a4/0x350 [ 3986.163532] ? kthread_complete_and_exit+0x20/0x20 [ 3986.164196] ret_from_fork+0x1f/0x30 [ 3986.164706] [ 3986.165026] [ 3986.165258] Allocated by task 116273: [ 3986.165766] kasan_save_stack+0x1e/0x40 [ 3986.166300] __kasan_kmalloc+0x81/0xa0 [ 3986.166817] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.167556] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.168229] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.169057] kthread+0x2a4/0x350 [ 3986.169511] ret_from_fork+0x1f/0x30 [ 3986.170012] [ 3986.170243] The buggy address belongs to the object at ffff8880025962e0 [ 3986.170243] which belongs to the cache kmalloc-16 of size 16 [ 3986.171861] The buggy address is located 8 bytes inside of [ 3986.171861] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.173375] [ 3986.173606] The buggy address belongs to the physical page: [ 3986.174356] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.175579] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.176504] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.177534] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.178565] page dumped because: kasan: bad access detected [ 3986.179318] [ 3986.179550] Memory state around the buggy address: [ 3986.180205] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.181175] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.182142] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.183105] ^ [ 3986.183989] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.184952] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.185919] ================================================================== [ 3986.186938] ================================================================== [ 3986.187910] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 3986.189147] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.190168] [ 3986.190400] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.192553] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.193335] Call Trace: [ 3986.193688] [ 3986.194006] ? kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 3986.194962] dump_stack_lvl+0x57/0x81 [ 3986.195484] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.196266] ? kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 3986.197156] print_report.cold+0x5c/0x237 [ 3986.197707] kasan_report+0xc9/0x100 [ 3986.198210] ? kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 3986.199177] kasan_check_range+0xfd/0x1e0 [ 3986.199928] kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 3986.200856] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3986.201549] ? put_prev_task_fair+0x37/0x70 [ 3986.202198] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.202814] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.203469] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.204233] ? rcu_read_lock_held+0x30/0x50 [ 3986.204805] ? trace_kmalloc+0x3c/0x100 [ 3986.205415] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.206221] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3986.207038] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.208036] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.208817] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.209514] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.210186] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.210875] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.211698] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.212402] kthread+0x2a4/0x350 [ 3986.212857] ? kthread_complete_and_exit+0x20/0x20 [ 3986.213514] ret_from_fork+0x1f/0x30 [ 3986.214031] [ 3986.214349] [ 3986.214617] Allocated by task 116273: [ 3986.215257] kasan_save_stack+0x1e/0x40 [ 3986.215915] __kasan_kmalloc+0x81/0xa0 [ 3986.216565] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.217469] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.218270] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.219303] kthread+0x2a4/0x350 [ 3986.219839] ret_from_fork+0x1f/0x30 [ 3986.220467] [ 3986.220736] The buggy address belongs to the object at ffff8880025962e0 [ 3986.220736] which belongs to the cache kmalloc-16 of size 16 [ 3986.223046] The buggy address is located 8 bytes inside of [ 3986.223046] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.224760] [ 3986.225001] The buggy address belongs to the physical page: [ 3986.225839] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.227470] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.228516] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.229548] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.230663] page dumped because: kasan: bad access detected [ 3986.231651] [ 3986.231953] Memory state around the buggy address: [ 3986.232822] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.234121] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.235406] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.236694] ^ [ 3986.237870] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.239165] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.240450] ================================================================== [ 3986.241783] ================================================================== [ 3986.243091] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 3986.244746] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.246108] [ 3986.246417] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.248833] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.249878] Call Trace: [ 3986.250352] [ 3986.250774] ? kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 3986.251978] dump_stack_lvl+0x57/0x81 [ 3986.252665] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.253707] ? kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 3986.254886] print_report.cold+0x5c/0x237 [ 3986.255638] kasan_report+0xc9/0x100 [ 3986.256316] ? kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 3986.257503] kasan_check_range+0xfd/0x1e0 [ 3986.258243] kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 3986.259401] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3986.260326] ? put_prev_task_fair+0x37/0x70 [ 3986.261093] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.261908] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.262780] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.263784] ? rcu_read_lock_held+0x30/0x50 [ 3986.264550] ? trace_kmalloc+0x3c/0x100 [ 3986.265260] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.266125] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3986.267104] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.268426] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.269455] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.270384] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.271280] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.272204] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.273240] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.273948] kthread+0x2a4/0x350 [ 3986.274445] ? kthread_complete_and_exit+0x20/0x20 [ 3986.275141] ret_from_fork+0x1f/0x30 [ 3986.275650] [ 3986.275984] [ 3986.276230] Allocated by task 116273: [ 3986.276766] kasan_save_stack+0x1e/0x40 [ 3986.277319] __kasan_kmalloc+0x81/0xa0 [ 3986.277836] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.278611] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.279323] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.280157] kthread+0x2a4/0x350 [ 3986.280624] ret_from_fork+0x1f/0x30 [ 3986.281147] [ 3986.281420] The buggy address belongs to the object at ffff8880025962e0 [ 3986.281420] which belongs to the cache kmalloc-16 of size 16 [ 3986.283087] The buggy address is located 8 bytes inside of [ 3986.283087] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.284602] [ 3986.284834] The buggy address belongs to the physical page: [ 3986.285584] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.286821] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.287748] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.288785] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.289819] page dumped because: kasan: bad access detected [ 3986.290570] [ 3986.290802] Memory state around the buggy address: [ 3986.291459] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.292426] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.293395] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.294364] ^ [ 3986.295252] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.296221] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.297192] ================================================================== [ 3986.298198] ================================================================== [ 3986.299171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 3986.300504] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.301529] [ 3986.301764] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.303592] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.304401] Call Trace: [ 3986.304776] [ 3986.305157] ? kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 3986.306194] dump_stack_lvl+0x57/0x81 [ 3986.306708] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.307496] ? kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 3986.308485] print_report.cold+0x5c/0x237 [ 3986.309051] kasan_report+0xc9/0x100 [ 3986.309581] ? kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 3986.310611] kasan_check_range+0xfd/0x1e0 [ 3986.311175] kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 3986.312205] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.313109] ? put_prev_task_fair+0x37/0x70 [ 3986.313709] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.314357] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.315016] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.315766] ? rcu_read_lock_held+0x30/0x50 [ 3986.316340] ? trace_kmalloc+0x3c/0x100 [ 3986.316869] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.317521] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.318268] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.319263] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.320040] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.320731] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.321419] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.322158] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.323269] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.324232] kthread+0x2a4/0x350 [ 3986.324851] ? kthread_complete_and_exit+0x20/0x20 [ 3986.325743] ret_from_fork+0x1f/0x30 [ 3986.326444] [ 3986.326872] [ 3986.327194] Allocated by task 116273: [ 3986.327871] kasan_save_stack+0x1e/0x40 [ 3986.328590] __kasan_kmalloc+0x81/0xa0 [ 3986.329302] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.330299] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.331198] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.332321] kthread+0x2a4/0x350 [ 3986.332935] ret_from_fork+0x1f/0x30 [ 3986.333611] [ 3986.333918] The buggy address belongs to the object at ffff8880025962e0 [ 3986.333918] which belongs to the cache kmalloc-16 of size 16 [ 3986.335768] The buggy address is located 8 bytes inside of [ 3986.335768] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.337308] [ 3986.337543] The buggy address belongs to the physical page: [ 3986.338441] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.339685] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.340617] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.341668] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.342726] page dumped because: kasan: bad access detected [ 3986.343489] [ 3986.343734] Memory state around the buggy address: [ 3986.344393] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.345374] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.346360] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.347345] ^ [ 3986.348263] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.349250] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.350235] ================================================================== [ 3986.351266] ================================================================== [ 3986.352567] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 3986.354370] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.355734] [ 3986.356059] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.358472] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.359514] Call Trace: [ 3986.359989] [ 3986.360402] ? kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 3986.361628] dump_stack_lvl+0x57/0x81 [ 3986.362183] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.362994] ? kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 3986.364019] print_report.cold+0x5c/0x237 [ 3986.364575] kasan_report+0xc9/0x100 [ 3986.365097] ? kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 3986.366119] kasan_check_range+0xfd/0x1e0 [ 3986.366677] kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 3986.367682] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.368587] ? put_prev_task_fair+0x37/0x70 [ 3986.369181] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.369813] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.370636] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.371633] ? rcu_read_lock_held+0x30/0x50 [ 3986.372421] ? trace_kmalloc+0x3c/0x100 [ 3986.373146] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.374030] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.375025] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.376333] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.377370] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.378307] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.379230] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.380124] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.381229] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.382169] kthread+0x2a4/0x350 [ 3986.382788] ? kthread_complete_and_exit+0x20/0x20 [ 3986.383680] ret_from_fork+0x1f/0x30 [ 3986.384370] [ 3986.384798] [ 3986.385118] Allocated by task 116273: [ 3986.385798] kasan_save_stack+0x1e/0x40 [ 3986.386519] __kasan_kmalloc+0x81/0xa0 [ 3986.387216] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.388193] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.389089] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.390185] kthread+0x2a4/0x350 [ 3986.390790] ret_from_fork+0x1f/0x30 [ 3986.391463] [ 3986.391771] The buggy address belongs to the object at ffff8880025962e0 [ 3986.391771] which belongs to the cache kmalloc-16 of size 16 [ 3986.393913] The buggy address is located 8 bytes inside of [ 3986.393913] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.395927] [ 3986.396266] The buggy address belongs to the physical page: [ 3986.397258] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.398858] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.400080] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.401458] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.402819] page dumped because: kasan: bad access detected [ 3986.403810] [ 3986.404128] Memory state around the buggy address: [ 3986.404992] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.406272] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.407550] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.408830] ^ [ 3986.410016] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.411295] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.412579] ================================================================== [ 3986.413926] ================================================================== [ 3986.415248] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 3986.417042] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.418400] [ 3986.418709] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.421115] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.422149] Call Trace: [ 3986.422616] [ 3986.423049] ? kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 3986.424392] dump_stack_lvl+0x57/0x81 [ 3986.425144] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.426221] ? kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 3986.427662] print_report.cold+0x5c/0x237 [ 3986.428305] kasan_report+0xc9/0x100 [ 3986.428840] ? kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 3986.429978] kasan_check_range+0xfd/0x1e0 [ 3986.430569] kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 3986.431573] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.432514] ? put_prev_task_fair+0x37/0x70 [ 3986.433131] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.433798] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.434731] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.435825] ? rcu_read_lock_held+0x30/0x50 [ 3986.436650] ? trace_kmalloc+0x3c/0x100 [ 3986.437465] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.438163] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.438928] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.439963] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.440734] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.441453] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.442298] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.443264] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.444422] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.445409] kthread+0x2a4/0x350 [ 3986.446114] ? kthread_complete_and_exit+0x20/0x20 [ 3986.447018] ret_from_fork+0x1f/0x30 [ 3986.447820] [ 3986.448280] [ 3986.448611] Allocated by task 116273: [ 3986.449363] kasan_save_stack+0x1e/0x40 [ 3986.450130] __kasan_kmalloc+0x81/0xa0 [ 3986.450819] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.451832] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.452688] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.453615] kthread+0x2a4/0x350 [ 3986.454077] ret_from_fork+0x1f/0x30 [ 3986.454590] [ 3986.454856] The buggy address belongs to the object at ffff8880025962e0 [ 3986.454856] which belongs to the cache kmalloc-16 of size 16 [ 3986.457001] The buggy address is located 8 bytes inside of [ 3986.457001] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.459037] [ 3986.459391] The buggy address belongs to the physical page: [ 3986.460441] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.462130] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.463384] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.464844] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.466340] page dumped because: kasan: bad access detected [ 3986.467385] [ 3986.467717] Memory state around the buggy address: [ 3986.468640] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.469946] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.471259] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.472572] ^ [ 3986.473762] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.475067] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.476337] ================================================================== [ 3986.477645] ================================================================== [ 3986.478938] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 3986.480682] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.482143] [ 3986.482467] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.484942] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.485998] Call Trace: [ 3986.486468] [ 3986.486871] ? kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 3986.488081] dump_stack_lvl+0x57/0x81 [ 3986.488632] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.489445] ? kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 3986.490471] print_report.cold+0x5c/0x237 [ 3986.491186] kasan_report+0xc9/0x100 [ 3986.491919] ? kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 3986.493308] kasan_check_range+0xfd/0x1e0 [ 3986.494087] kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 3986.495406] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.496682] ? put_prev_task_fair+0x37/0x70 [ 3986.497564] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.498426] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.499177] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.500064] ? rcu_read_lock_held+0x30/0x50 [ 3986.500739] ? trace_kmalloc+0x3c/0x100 [ 3986.501536] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.502479] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.503794] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.505098] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.506025] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.506941] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.507926] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.508927] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.510150] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.511274] kthread+0x2a4/0x350 [ 3986.511969] ? kthread_complete_and_exit+0x20/0x20 [ 3986.513012] ret_from_fork+0x1f/0x30 [ 3986.513823] [ 3986.514317] [ 3986.514609] Allocated by task 116273: [ 3986.515251] kasan_save_stack+0x1e/0x40 [ 3986.516158] __kasan_kmalloc+0x81/0xa0 [ 3986.516997] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.518144] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.519212] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.520465] kthread+0x2a4/0x350 [ 3986.521181] ret_from_fork+0x1f/0x30 [ 3986.521902] [ 3986.522238] The buggy address belongs to the object at ffff8880025962e0 [ 3986.522238] which belongs to the cache kmalloc-16 of size 16 [ 3986.524778] The buggy address is located 8 bytes inside of [ 3986.524778] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.527098] [ 3986.527463] The buggy address belongs to the physical page: [ 3986.528615] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.530524] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.532004] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.533591] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.535282] page dumped because: kasan: bad access detected [ 3986.536580] [ 3986.536923] Memory state around the buggy address: [ 3986.537897] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.539325] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.540902] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.542462] ^ [ 3986.543797] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.545271] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.546762] ================================================================== [ 3986.548369] ================================================================== [ 3986.549906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 3986.552035] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.553590] [ 3986.553954] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.556953] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.558184] Call Trace: [ 3986.558729] [ 3986.559233] ? kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 3986.560863] dump_stack_lvl+0x57/0x81 [ 3986.561700] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.563072] ? kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 3986.564603] print_report.cold+0x5c/0x237 [ 3986.565358] kasan_report+0xc9/0x100 [ 3986.566059] ? kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 3986.567392] kasan_check_range+0xfd/0x1e0 [ 3986.568134] kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 3986.569462] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.570684] ? put_prev_task_fair+0x37/0x70 [ 3986.571608] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.572576] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.573588] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.574762] ? rcu_read_lock_held+0x30/0x50 [ 3986.575650] ? trace_kmalloc+0x3c/0x100 [ 3986.576476] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.577478] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.578636] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.580148] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.581331] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.582409] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.583435] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.584482] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.585729] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.586796] kthread+0x2a4/0x350 [ 3986.587480] ? kthread_complete_and_exit+0x20/0x20 [ 3986.588481] ret_from_fork+0x1f/0x30 [ 3986.589257] [ 3986.589732] [ 3986.590092] Allocated by task 116273: [ 3986.590857] kasan_save_stack+0x1e/0x40 [ 3986.591666] __kasan_kmalloc+0x81/0xa0 [ 3986.592457] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.593566] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.594587] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.595840] kthread+0x2a4/0x350 [ 3986.596534] ret_from_fork+0x1f/0x30 [ 3986.597293] [ 3986.597641] The buggy address belongs to the object at ffff8880025962e0 [ 3986.597641] which belongs to the cache kmalloc-16 of size 16 [ 3986.600181] The buggy address is located 8 bytes inside of [ 3986.600181] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.602510] [ 3986.602862] The buggy address belongs to the physical page: [ 3986.604026] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.605901] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.607298] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.608860] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.610431] page dumped because: kasan: bad access detected [ 3986.611563] [ 3986.611920] Memory state around the buggy address: [ 3986.612903] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.613911] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.614881] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.615848] ^ [ 3986.616742] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.617716] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.618687] ================================================================== [ 3986.619702] ================================================================== [ 3986.620683] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 3986.622034] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.623061] [ 3986.623295] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.625118] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.625892] Call Trace: [ 3986.626251] [ 3986.626564] ? kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 3986.627565] dump_stack_lvl+0x57/0x81 [ 3986.628087] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.628870] ? kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 3986.629866] print_report.cold+0x5c/0x237 [ 3986.630570] kasan_report+0xc9/0x100 [ 3986.631079] ? kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 3986.632080] kasan_check_range+0xfd/0x1e0 [ 3986.632633] kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 3986.633608] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.634499] ? put_prev_task_fair+0x37/0x70 [ 3986.635078] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.635701] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.636354] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.637113] ? rcu_read_lock_held+0x30/0x50 [ 3986.637687] ? trace_kmalloc+0x3c/0x100 [ 3986.638222] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.638869] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.639623] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.640858] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.641906] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.642846] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.643751] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.644681] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.645782] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.646726] kthread+0x2a4/0x350 [ 3986.647360] ? kthread_complete_and_exit+0x20/0x20 [ 3986.648241] ret_from_fork+0x1f/0x30 [ 3986.649100] [ 3986.649523] [ 3986.649833] Allocated by task 116273: [ 3986.650512] kasan_save_stack+0x1e/0x40 [ 3986.651223] __kasan_kmalloc+0x81/0xa0 [ 3986.651908] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.652889] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.653785] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.654888] kthread+0x2a4/0x350 [ 3986.655505] ret_from_fork+0x1f/0x30 [ 3986.656173] [ 3986.656482] The buggy address belongs to the object at ffff8880025962e0 [ 3986.656482] which belongs to the cache kmalloc-16 of size 16 [ 3986.658638] The buggy address is located 8 bytes inside of [ 3986.658638] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.660655] [ 3986.660974] The buggy address belongs to the physical page: [ 3986.661972] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.663603] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.664840] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.666218] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.667583] page dumped because: kasan: bad access detected [ 3986.668584] [ 3986.668894] Memory state around the buggy address: [ 3986.669767] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.671061] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.672343] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.673631] ^ [ 3986.674801] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.676103] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.677392] ================================================================== [ 3986.678738] ================================================================== [ 3986.680052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 3986.681839] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.683203] [ 3986.683514] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.685922] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.686977] Call Trace: [ 3986.687450] [ 3986.687864] ? kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 3986.689206] dump_stack_lvl+0x57/0x81 [ 3986.689890] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.690962] ? kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 3986.692297] print_report.cold+0x5c/0x237 [ 3986.693047] kasan_report+0xc9/0x100 [ 3986.693718] ? kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 3986.694803] kasan_check_range+0xfd/0x1e0 [ 3986.695375] kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 3986.696357] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.697251] ? put_prev_task_fair+0x37/0x70 [ 3986.697825] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.698464] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.699123] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.699884] ? rcu_read_lock_held+0x30/0x50 [ 3986.700464] ? trace_kmalloc+0x3c/0x100 [ 3986.701003] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.701654] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.702402] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.703401] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.704180] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.704875] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.705552] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.706250] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.707081] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.707782] kthread+0x2a4/0x350 [ 3986.708243] ? kthread_complete_and_exit+0x20/0x20 [ 3986.708899] ret_from_fork+0x1f/0x30 [ 3986.709418] [ 3986.709737] [ 3986.709974] Allocated by task 116273: [ 3986.710481] kasan_save_stack+0x1e/0x40 [ 3986.711018] __kasan_kmalloc+0x81/0xa0 [ 3986.711535] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.712269] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.712941] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.713764] kthread+0x2a4/0x350 [ 3986.714228] ret_from_fork+0x1f/0x30 [ 3986.714727] [ 3986.714968] The buggy address belongs to the object at ffff8880025962e0 [ 3986.714968] which belongs to the cache kmalloc-16 of size 16 [ 3986.716592] The buggy address is located 8 bytes inside of [ 3986.716592] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.718110] [ 3986.718344] The buggy address belongs to the physical page: [ 3986.719095] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.720323] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.721248] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.722283] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.723314] page dumped because: kasan: bad access detected [ 3986.724065] [ 3986.724296] Memory state around the buggy address: [ 3986.724952] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.725919] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.726888] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.727859] ^ [ 3986.728758] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.729726] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.730697] ================================================================== [ 3986.731721] ================================================================== [ 3986.732698] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 3986.734048] Read of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.735060] [ 3986.735292] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.737114] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.737895] Call Trace: [ 3986.738257] [ 3986.738567] ? kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 3986.739572] dump_stack_lvl+0x57/0x81 [ 3986.740093] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.740877] ? kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 3986.741872] print_report.cold+0x5c/0x237 [ 3986.742434] kasan_report+0xc9/0x100 [ 3986.742938] ? kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 3986.743937] kasan_check_range+0xfd/0x1e0 [ 3986.744490] kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 3986.745466] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.746613] ? put_prev_task_fair+0x37/0x70 [ 3986.747202] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.747820] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.748475] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.749235] ? rcu_read_lock_held+0x30/0x50 [ 3986.749810] ? trace_kmalloc+0x3c/0x100 [ 3986.750356] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.751012] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.751758] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.752761] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.753539] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.754238] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.754909] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.755607] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.756437] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.757144] kthread+0x2a4/0x350 [ 3986.757599] ? kthread_complete_and_exit+0x20/0x20 [ 3986.758259] ret_from_fork+0x1f/0x30 [ 3986.758769] [ 3986.759095] [ 3986.759328] Allocated by task 116273: [ 3986.759834] kasan_save_stack+0x1e/0x40 [ 3986.760370] __kasan_kmalloc+0x81/0xa0 [ 3986.760887] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.761622] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.762297] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.763132] kthread+0x2a4/0x350 [ 3986.763584] ret_from_fork+0x1f/0x30 [ 3986.764089] [ 3986.764322] The buggy address belongs to the object at ffff8880025962e0 [ 3986.764322] which belongs to the cache kmalloc-16 of size 16 [ 3986.765943] The buggy address is located 8 bytes inside of [ 3986.765943] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.767456] [ 3986.767689] The buggy address belongs to the physical page: [ 3986.768441] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.769663] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.770585] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.771619] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.772650] page dumped because: kasan: bad access detected [ 3986.773402] [ 3986.773633] Memory state around the buggy address: [ 3986.774289] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.775261] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.776231] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.777201] ^ [ 3986.778089] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.779061] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.780032] ================================================================== [ 3986.781046] ================================================================== [ 3986.782030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 3986.783375] Read of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.784391] [ 3986.784625] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.786443] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.787324] Call Trace: [ 3986.787677] [ 3986.787990] ? kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 3986.789235] dump_stack_lvl+0x57/0x81 [ 3986.789869] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.790663] ? kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 3986.791663] print_report.cold+0x5c/0x237 [ 3986.792236] kasan_report+0xc9/0x100 [ 3986.792737] ? kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 3986.793750] kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 3986.794870] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.795775] ? put_prev_task_fair+0x37/0x70 [ 3986.796357] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.796978] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.797627] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.798384] ? rcu_read_lock_held+0x30/0x50 [ 3986.799004] ? trace_kmalloc+0x3c/0x100 [ 3986.799537] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.800194] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.800984] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.802018] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.802796] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.803498] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.804172] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.804863] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.805696] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.806401] kthread+0x2a4/0x350 [ 3986.806857] ? kthread_complete_and_exit+0x20/0x20 [ 3986.807519] ret_from_fork+0x1f/0x30 [ 3986.808034] [ 3986.808352] [ 3986.808584] Allocated by task 116273: [ 3986.809097] kasan_save_stack+0x1e/0x40 [ 3986.809627] __kasan_kmalloc+0x81/0xa0 [ 3986.810153] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.810883] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.811630] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.812534] kthread+0x2a4/0x350 [ 3986.812997] ret_from_fork+0x1f/0x30 [ 3986.813495] [ 3986.813727] The buggy address belongs to the object at ffff8880025962e0 [ 3986.813727] which belongs to the cache kmalloc-16 of size 16 [ 3986.815353] The buggy address is located 8 bytes inside of [ 3986.815353] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.816914] [ 3986.817151] The buggy address belongs to the physical page: [ 3986.817900] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.819197] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.820171] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.821207] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.822240] page dumped because: kasan: bad access detected [ 3986.822992] [ 3986.823225] Memory state around the buggy address: [ 3986.823874] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.824843] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.825814] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.826778] ^ [ 3986.827660] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.828661] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.829653] ================================================================== [ 3986.830775] ================================================================== [ 3986.831975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 3986.833325] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.834351] [ 3986.834585] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.836486] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.838390] Call Trace: [ 3986.838812] [ 3986.839214] ? kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 3986.840474] dump_stack_lvl+0x57/0x81 [ 3986.841124] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.842102] ? kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 3986.843381] print_report.cold+0x5c/0x237 [ 3986.844048] kasan_report+0xc9/0x100 [ 3986.844723] ? kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 3986.845897] kasan_check_range+0xfd/0x1e0 [ 3986.846682] kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 3986.848263] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.849603] ? put_prev_task_fair+0x37/0x70 [ 3986.850381] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.851155] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.851940] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.852946] ? rcu_read_lock_held+0x30/0x50 [ 3986.853663] ? trace_kmalloc+0x3c/0x100 [ 3986.854305] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.855161] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.856077] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.857251] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.858192] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.859059] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.859858] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.860692] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.861694] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.862618] kthread+0x2a4/0x350 [ 3986.863182] ? kthread_complete_and_exit+0x20/0x20 [ 3986.863976] ret_from_fork+0x1f/0x30 [ 3986.864617] [ 3986.865013] [ 3986.865289] Allocated by task 116273: [ 3986.865901] kasan_save_stack+0x1e/0x40 [ 3986.866546] __kasan_kmalloc+0x81/0xa0 [ 3986.867183] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.868058] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.868851] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.869839] kthread+0x2a4/0x350 [ 3986.870440] ret_from_fork+0x1f/0x30 [ 3986.871138] [ 3986.871449] The buggy address belongs to the object at ffff8880025962e0 [ 3986.871449] which belongs to the cache kmalloc-16 of size 16 [ 3986.873433] The buggy address is located 8 bytes inside of [ 3986.873433] 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.875360] [ 3986.875635] The buggy address belongs to the physical page: [ 3986.876700] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.878208] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.879330] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.880587] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.881797] page dumped because: kasan: bad access detected [ 3986.882776] [ 3986.883072] Memory state around the buggy address: [ 3986.883873] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.885028] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.886238] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.887372] ^ [ 3986.888433] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.889588] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.890818] ================================================================== [ 3986.895588] ok 45 - kasan_bitops_generic [ 3986.918017] ok 46 - kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 3986.920259] ================================================================== [ 3986.922874] BUG: KASAN: use-after-free in kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.924171] Read of size 1 at addr ffff888002596940 by task kunit_try_catch/116275 [ 3986.925412] [ 3986.925685] CPU: 1 PID: 116275 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.927854] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.928810] Call Trace: [ 3986.929231] [ 3986.929598] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.930721] dump_stack_lvl+0x57/0x81 [ 3986.931346] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.932313] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.933263] print_report.cold+0x5c/0x237 [ 3986.933923] kasan_report+0xc9/0x100 [ 3986.934515] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.935447] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.936375] __kasan_check_byte+0x36/0x50 [ 3986.937042] kfree_sensitive+0x1b/0x60 [ 3986.937676] kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.938569] ? vmalloc_oob+0x5e0/0x5e0 [test_kasan] [ 3986.939378] ? do_raw_spin_trylock+0xb5/0x180 [ 3986.940116] ? do_raw_spin_lock+0x270/0x270 [ 3986.940811] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.941744] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.942577] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.943424] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.944292] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.945308] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.946196] kthread+0x2a4/0x350 [ 3986.946740] ? kthread_complete_and_exit+0x20/0x20 [ 3986.947538] ret_from_fork+0x1f/0x30 [ 3986.948175] [ 3986.948543] [ 3986.948816] Allocated by task 116275: [ 3986.949431] kasan_save_stack+0x1e/0x40 [ 3986.950063] __kasan_kmalloc+0x81/0xa0 [ 3986.950688] kmalloc_double_kzfree+0x9a/0x270 [test_kasan] [ 3986.951590] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.952413] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.953409] kthread+0x2a4/0x350 [ 3986.953963] ret_from_fork+0x1f/0x30 [ 3986.954561] [ 3986.954833] Freed by task 116275: [ 3986.955407] kasan_save_stack+0x1e/0x40 [ 3986.956057] kasan_set_track+0x21/0x30 [ 3986.956778] kasan_set_free_info+0x20/0x40 [ 3986.957541] __kasan_slab_free+0x108/0x170 [ 3986.958113] slab_free_freelist_hook+0x11d/0x1d0 [ 3986.958786] kfree+0xe2/0x3c0 [ 3986.959217] kmalloc_double_kzfree+0x137/0x270 [test_kasan] [ 3986.959982] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.960650] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.961594] kthread+0x2a4/0x350 [ 3986.962097] ret_from_fork+0x1f/0x30 [ 3986.962672] [ 3986.962906] The buggy address belongs to the object at ffff888002596940 [ 3986.962906] which belongs to the cache kmalloc-16 of size 16 [ 3986.964600] The buggy address is located 0 bytes inside of [ 3986.964600] 16-byte region [ffff888002596940, ffff888002596950) [ 3986.966207] [ 3986.966456] The buggy address belongs to the physical page: [ 3986.967307] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.968530] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.969536] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.970591] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.971619] page dumped because: kasan: bad access detected [ 3986.972373] [ 3986.972604] Memory state around the buggy address: [ 3986.973291] ffff888002596800: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.974257] ffff888002596880: fb fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 3986.975220] >ffff888002596900: 00 00 fc fc fb fb fc fc fa fb fc fc 00 00 fc fc [ 3986.976184] ^ [ 3986.976895] ffff888002596980: fb fb fc fc fb fb fc fc fb fb fc fc fa fb fc fc [ 3986.977906] ffff888002596a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 3986.978898] ================================================================== [ 3986.980006] ================================================================== [ 3986.981133] BUG: KASAN: double-free or invalid-free in kfree+0xe2/0x3c0 [ 3986.982059] [ 3986.982292] CPU: 1 PID: 116275 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.984094] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.984867] Call Trace: [ 3986.985261] [ 3986.985591] dump_stack_lvl+0x57/0x81 [ 3986.986110] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.986921] print_report.cold+0x5c/0x237 [ 3986.987471] ? kfree+0xe2/0x3c0 [ 3986.987918] ? kfree+0xe2/0x3c0 [ 3986.988361] kasan_report_invalid_free+0x99/0xc0 [ 3986.988997] ? kfree+0xe2/0x3c0 [ 3986.989471] ? kfree+0xe2/0x3c0 [ 3986.989917] __kasan_slab_free+0x152/0x170 [ 3986.990478] slab_free_freelist_hook+0x11d/0x1d0 [ 3986.991127] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.991916] kfree+0xe2/0x3c0 [ 3986.992340] ? __kasan_check_byte+0x36/0x50 [ 3986.992918] kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.993736] ? vmalloc_oob+0x5e0/0x5e0 [test_kasan] [ 3986.994443] ? do_raw_spin_trylock+0xb5/0x180 [ 3986.995052] ? do_raw_spin_lock+0x270/0x270 [ 3986.995630] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.996395] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.997094] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.997796] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.998488] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.999313] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3987.000015] kthread+0x2a4/0x350 [ 3987.000470] ? kthread_complete_and_exit+0x20/0x20 [ 3987.001132] ret_from_fork+0x1f/0x30 [ 3987.001681] [ 3987.002012] [ 3987.002270] Allocated by task 116275: [ 3987.002774] kasan_save_stack+0x1e/0x40 [ 3987.003308] __kasan_kmalloc+0x81/0xa0 [ 3987.003971] kmalloc_double_kzfree+0x9a/0x270 [test_kasan] [ 3987.004974] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3987.005868] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3987.007026] kthread+0x2a4/0x350 [ 3987.007503] ret_from_fork+0x1f/0x30 [ 3987.008011] [ 3987.008244] Freed by task 116275: [ 3987.008705] kasan_save_stack+0x1e/0x40 [ 3987.009244] kasan_set_track+0x21/0x30 [ 3987.009761] kasan_set_free_info+0x20/0x40 [ 3987.010330] __kasan_slab_free+0x108/0x170 [ 3987.010892] slab_free_freelist_hook+0x11d/0x1d0 [ 3987.011541] kfree+0xe2/0x3c0 [ 3987.011969] kmalloc_double_kzfree+0x137/0x270 [test_kasan] [ 3987.012727] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3987.013403] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3987.014316] kthread+0x2a4/0x350 [ 3987.014797] ret_from_fork+0x1f/0x30 [ 3987.015332] [ 3987.015567] The buggy address belongs to the object at ffff888002596940 [ 3987.015567] which belongs to the cache kmalloc-16 of size 16 [ 3987.017372] The buggy address is located 0 bytes inside of [ 3987.017372] 16-byte region [ffff888002596940, ffff888002596950) [ 3987.019404] [ 3987.019719] The buggy address belongs to the physical page: [ 3987.020715] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3987.022345] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3987.023575] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3987.024650] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3987.025733] page dumped because: kasan: bad access detected [ 3987.026511] [ 3987.026742] Memory state around the buggy address: [ 3987.027402] ffff888002596800: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3987.028403] ffff888002596880: fb fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 3987.029501] >ffff888002596900: 00 00 fc fc fb fb fc fc fa fb fc fc 00 00 fc fc [ 3987.030802] ^ [ 3987.031760] ffff888002596980: fb fb fc fc fb fb fc fc fb fb fc fc fa fb fc fc [ 3987.033060] ffff888002596a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 3987.034354] ================================================================== [ 3987.039737] ok 47 - kmalloc_double_kzfree [ 3987.042492] ok 48 - vmalloc_helpers_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 3987.049707] ================================================================== [ 3987.052481] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x596/0x5e0 [test_kasan] [ 3987.053877] Read of size 1 at addr ffffc900000777f3 by task kunit_try_catch/116277 [ 3987.055233] [ 3987.055548] CPU: 0 PID: 116277 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3987.057968] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3987.059005] Call Trace: [ 3987.059474] [ 3987.059885] ? vmalloc_oob+0x596/0x5e0 [test_kasan] [ 3987.060790] dump_stack_lvl+0x57/0x81 [ 3987.061490] print_address_description.constprop.0+0x1f/0x1e0 [ 3987.062564] ? vmalloc_oob+0x596/0x5e0 [test_kasan] [ 3987.063641] print_report.cold+0x5c/0x237 [ 3987.064511] kasan_report+0xc9/0x100 [ 3987.065286] ? vmalloc_oob+0x596/0x5e0 [test_kasan] [ 3987.066319] vmalloc_oob+0x596/0x5e0 [test_kasan] [ 3987.067313] ? kasan_global_oob_right+0x1f0/0x1f0 [test_kasan] [ 3987.068652] ? do_raw_spin_trylock+0xb5/0x180 [ 3987.069581] ? do_raw_spin_lock+0x270/0x270 [ 3987.070459] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3987.071610] ? kunit_add_resource+0x197/0x280 [kunit] [ 3987.072661] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3987.073680] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3987.074747] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3987.076011] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3987.077077] kthread+0x2a4/0x350 [ 3987.077768] ? kthread_complete_and_exit+0x20/0x20 [ 3987.078767] ret_from_fork+0x1f/0x30 [ 3987.079544] [ 3987.080040] [ 3987.080394] The buggy address belongs to the virtual mapping at [ 3987.080394] [ffffc90000077000, ffffc90000079000) created by: [ 3987.080394] vmalloc_oob+0x78/0x5e0 [test_kasan] [ 3987.083636] [ 3987.084007] The buggy address belongs to the physical page: [ 3987.085146] page:00000000d61211a0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045e3 [ 3987.087038] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 3987.088367] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 3987.089950] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3987.091510] page dumped because: kasan: bad access detected [ 3987.092645] [ 3987.093011] Memory state around the buggy address: [ 3987.094003] ffffc90000077680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3987.095468] ffffc90000077700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3987.096936] >ffffc90000077780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 3987.098398] ^ [ 3987.099784] ffffc90000077800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 3987.101358] ffffc90000077880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 3987.102354] ================================================================== [ 3987.103426] ================================================================== [ 3987.104428] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 3987.105518] Read of size 1 at addr ffffc900000777f8 by task kunit_try_catch/116277 [ 3987.106794] [ 3987.107048] CPU: 0 PID: 116277 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3987.108916] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3987.109714] Call Trace: [ 3987.110082] [ 3987.110402] ? vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 3987.111094] dump_stack_lvl+0x57/0x81 [ 3987.111665] print_address_description.constprop.0+0x1f/0x1e0 [ 3987.112482] ? vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 3987.113170] print_report.cold+0x5c/0x237 [ 3987.113740] kasan_report+0xc9/0x100 [ 3987.114259] ? vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 3987.114971] vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 3987.115639] ? kasan_global_oob_right+0x1f0/0x1f0 [test_kasan] [ 3987.116457] ? do_raw_spin_trylock+0xb5/0x180 [ 3987.117082] ? do_raw_spin_lock+0x270/0x270 [ 3987.117711] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3987.118515] ? kunit_add_resource+0x197/0x280 [kunit] [ 3987.119234] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3987.119927] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3987.120637] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3987.121558] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3987.122283] kthread+0x2a4/0x350 [ 3987.122752] ? kthread_complete_and_exit+0x20/0x20 [ 3987.123431] ret_from_fork+0x1f/0x30 [ 3987.123956] [ 3987.124282] [ 3987.124523] The buggy address belongs to the virtual mapping at [ 3987.124523] [ffffc90000077000, ffffc90000079000) created by: [ 3987.124523] vmalloc_oob+0x78/0x5e0 [test_kasan] [ 3987.126712] [ 3987.126955] The buggy address belongs to the physical page: [ 3987.127726] page:00000000d61211a0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045e3 [ 3987.129014] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 3987.129921] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 3987.130994] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3987.132098] page dumped because: kasan: bad access detected [ 3987.132867] [ 3987.133111] Memory state around the buggy address: [ 3987.133781] ffffc90000077680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3987.134775] ffffc90000077700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3987.135770] >ffffc90000077780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 3987.136783] ^ [ 3987.137770] ffffc90000077800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 3987.138767] ffffc90000077880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 3987.139779] ================================================================== [ 3987.141170] ok 49 - vmalloc_oob [ 3987.141548] ok 50 - vmap_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 3987.142482] ok 51 - vm_ # SKIP Test requires C [ 3987.146692] ok 52 - vmalloc_percpu # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 3987.148220] ok 53 - match_all_not_assigned # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 3987.150058] ok 54 - match_all_ptr_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 3987.151389] ok 55 - match_all_mem_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 3987.152523] ok 20 - kasan [ 3987.330799] # Subtest: linear-ranges-test [ 3987.330808] 1..4 [ 3987.332085] ok 1 - range_test_get_value_amount [ 3987.332731] ok 2 - range_test_get_selector_high [ 3987.333784] ok 3 - range_test_get_selector_low [ 3987.334856] ok 4 - range_test_get_value [ 3987.335671] ok 21 - linear-ranges-test [ 3987.397535] # Subtest: list_sort [ 3987.397545] 1..1 [ 3987.409255] ok 1 - list_sort_test [ 3987.409645] ok 22 - list_sort [ 3987.569164] # Subtest: time_test_cases [-- MARK -- Thu Feb 2 19:15:00 2023] [ 3987.569174] 1..1 [ 3993.207857] ok 1 - time64_to_tm_test_date_range [ 3993.208350] ok 23 - time_test_cases [ 4185.291734] Running test [R:13327125 T:9 - AMTU (Abstract Machine Test Utility) - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [ 4223.952184] Running test [R:13327125 T:10 - Kernel Header Sanity Test - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [-- MARK -- Thu Feb 2 19:20:00 2023] [ 4333.929877] systemd-rc-local-generator[131408]: /etc/rc.d/rc.local is not marked executable, skipping. [ 4343.973069] Running test [R:13327125 T:11 - Networking socket: fuzz - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [ 4448.652177] nfp: NFP PCIe Driver, Copyright (C) 2014-2020 Netronome Systems [ 4448.654000] nfp: NFP PCIe Driver, Copyright (C) 2021-2022 Corigine Inc. [ 4464.528285] sctp: Hash tables configured (bind 32/51) [ 4466.597984] systemd-rc-local-generator[141473]: /etc/rc.d/rc.local is not marked executable, skipping. [ 4475.446300] can: controller area network core [ 4475.459443] NET: Registered PF_CAN protocol family [ 4477.415566] socket uses obsolete (PF_INET,SOCK_PACKET) [ 4477.476858] PPP generic driver version 2.4.2 [ 4477.486517] NET: Registered PF_PPPOX protocol family [ 4477.593952] can: request_module (can-proto-0) failed. [ 4478.263520] Bluetooth: Core ver 2.22 [ 4478.264395] NET: Registered PF_BLUETOOTH protocol family [ 4478.265164] Bluetooth: HCI device and connection manager initialized [ 4478.266070] Bluetooth: HCI socket layer initialized [ 4478.267946] Bluetooth: L2CAP socket layer initialized [ 4478.268772] Bluetooth: SCO socket layer initialized [ 4478.312864] Guest personality initialized and is inactive [ 4478.315824] VMCI host device registered (name=vmci, major=10, minor=124) [ 4478.316797] Initialized host personality [ 4478.329804] NET: Registered PF_VSOCK protocol family [ 4478.593293] can: request_module (can-proto-0) failed. [ 4478.678149] can: request_module (can-proto-0) failed. [ 4478.990022] NET: Registered PF_QIPCRTR protocol family [ 4479.091843] can: request_module (can-proto-0) failed. [ 4479.263930] NET: Registered PF_IEEE802154 protocol family [ 4479.349888] NET: Registered PF_KEY protocol family [ 4479.478279] can: request_module (can-proto-0) failed. [ 4479.973862] can: request_module (can-proto-0) failed. [ 4480.361366] can: request_module (can-proto-0) failed. [ 4481.976696] can: request_module (can-proto-0) failed. [ 4482.227189] can: request_module (can-proto-0) failed. [ 4482.745603] can: request_module (can-proto-0) failed. [ 4482.978922] can: request_module (can-proto-0) failed. [ 4483.240563] can: request_module (can-proto-0) failed. [ 4483.645310] can: request_module (can-proto-0) failed. [ 4484.647834] can: request_module (can-proto-0) failed. [ 4485.247997] can: request_module (can-proto-0) failed. [ 4485.351325] can: request_module (can-proto-0) failed. [ 4485.690954] can: request_module (can-proto-0) failed. [ 4485.850712] can: request_module (can-proto-0) failed. [ 4485.980675] can: request_module (can-proto-0) failed. [ 4488.896543] can_create: 3 callbacks suppressed [ 4488.896559] can: request_module (can-proto-0) failed. [ 4490.010536] can: request_module (can-proto-0) failed. [ 4490.893862] can: request_module (can-proto-0) failed. [ 4490.928495] can: request_module (can-proto-0) failed. [ 4490.939823] can: request_module (can-proto-0) failed. [ 4491.376289] can: request_module (can-proto-0) failed. [ 4491.410722] can: request_module (can-proto-0) failed. [ 4491.493486] can: request_module (can-proto-0) failed. [ 4491.565703] can: request_module (can-proto-0) failed. [ 4492.026545] can: request_module (can-proto-0) failed. [ 4494.013066] can_create: 2 callbacks suppressed [ 4494.013080] can: request_module (can-proto-0) failed. [ 4495.945578] can: request_module (can-proto-0) failed. [ 4496.557311] can: request_module (can-proto-0) failed. [ 4496.902712] can: request_module (can-proto-0) failed. [ 4497.269041] can: request_module (can-proto-0) failed. [ 4497.732231] can: request_module (can-proto-0) failed. [ 4497.903805] can: request_module (can-proto-0) failed. [ 4498.059196] can: request_module (can-proto-0) failed. [ 4498.289119] can: request_module (can-proto-0) failed. [ 4498.303942] can: request_module (can-proto-0) failed. [ 4500.883066] can: request_module (can-proto-0) failed. [ 4500.906791] can: request_module (can-proto-0) failed. [ 4501.120268] can: request_module (can-proto-0) failed. [ 4501.486164] can: request_module (can-proto-0) failed. [ 4502.095597] can: request_module (can-proto-0) failed. [ 4502.451200] can: request_module (can-proto-0) failed. [ 4502.760710] can: request_module (can-proto-0) failed. [ 4503.342084] can: request_module (can-proto-0) failed. [ 4503.671698] can: request_module (can-proto-0) failed. [ 4504.018628] can: request_module (can-proto-0) failed. [ 4506.054899] can_create: 5 callbacks suppressed [ 4506.054912] can: request_module (can-proto-0) failed. [ 4506.614506] can: request_module (can-proto-0) failed. [ 4507.171120] can: request_module (can-proto-0) failed. [ 4507.246975] can: request_module (can-proto-0) failed. [ 4507.674099] can: request_module (can-proto-0) failed. [ 4507.717096] can: request_module (can-proto-0) failed. [ 4507.759557] can: request_module (can-proto-0) failed. [ 4508.203153] can: request_module (can-proto-0) failed. [ 4510.010039] can: request_module (can-proto-0) failed. [ 4510.871849] can: request_module (can-proto-0) failed. [ 4511.057413] can_create: 1 callbacks suppressed [ 4511.057428] can: request_module (can-proto-0) failed. [ 4511.082131] can: request_module (can-proto-0) failed. [ 4511.111089] can: request_module (can-proto-0) failed. [ 4511.640370] can: request_module (can-proto-0) failed. [ 4512.176537] can: request_module (can-proto-0) failed. [ 4512.770520] can: request_module (can-proto-0) failed. [ 4513.017898] can: request_module (can-proto-0) failed. [ 4513.139679] can: request_module (can-proto-0) failed. [ 4513.525532] can: request_module (can-proto-0) failed. [ 4514.017447] can: request_module (can-proto-0) failed. [ 4516.294003] can_create: 4 callbacks suppressed [ 4516.294011] can: request_module (can-proto-0) failed. [ 4516.366067] can: request_module (can-proto-0) failed. [ 4516.713874] can: request_module (can-proto-0) failed. [ 4516.780169] can: request_module (can-proto-0) failed. [ 4517.737802] can: request_module (can-proto-0) failed. [ 4518.367310] can: request_module (can-proto-0) failed. [ 4518.421625] can: request_module (can-proto-0) failed. [ 4518.637182] can: request_module (can-proto-0) failed. [ 4518.881500] can: request_module (can-proto-0) failed. [ 4519.664053] can: request_module (can-proto-0) failed. [ 4521.320023] can_create: 8 callbacks suppressed [ 4521.320060] can: request_module (can-proto-0) failed. [ 4521.490721] can: request_module (can-proto-0) failed. [ 4522.025891] can: request_module (can-proto-0) failed. [ 4522.854953] can: request_module (can-proto-0) failed. [ 4522.866800] can: request_module (can-proto-0) failed. [ 4522.972678] can: request_module (can-proto-0) failed. [ 4523.912045] can: request_module (can-proto-0) failed. [ 4524.059570] can: request_module (can-proto-0) failed. [ 4524.454664] can: request_module (can-proto-0) failed. [ 4524.571348] can: request_module (can-proto-0) failed. [ 4527.288967] can_create: 3 callbacks suppressed [ 4527.288982] can: request_module (can-proto-0) failed. [ 4527.373025] can: request_module (can-proto-0) failed. [ 4527.408446] can: request_module (can-proto-0) failed. [ 4527.538166] can: request_module (can-proto-0) failed. [ 4527.910134] can: request_module (can-proto-0) failed. [ 4527.969399] can: request_module (can-proto-0) failed. [ 4528.212130] can: request_module (can-proto-0) failed. [ 4528.946160] can: request_module (can-proto-0) failed. [ 4529.356268] can: request_module (can-proto-0) failed. [ 4529.476584] can: request_module (can-proto-0) failed. [ 4534.235725] can_create: 6 callbacks suppressed [ 4534.235736] can: request_module (can-proto-0) failed. [ 4534.270175] can: request_module (can-proto-0) failed. [ 4534.391070] can: request_module (can-proto-0) failed. [ 4535.142202] can: request_module (can-proto-0) failed. [ 4535.710510] can: request_module (can-proto-0) failed. [ 4537.377145] can: request_module (can-proto-0) failed. [ 4537.964429] can: request_module (can-proto-0) failed. [ 4538.315444] can: request_module (can-proto-0) failed. [ 4538.505614] can: request_module (can-proto-0) failed. [ 4538.729917] can: request_module (can-proto-0) failed. [ 4539.237715] can_create: 2 callbacks suppressed [ 4539.237727] can: request_module (can-proto-0) failed. [ 4541.039722] can: request_module (can-proto-0) failed. [ 4541.753854] can: request_module (can-proto-0) failed. [ 4543.693420] can: request_module (can-proto-0) failed. [ 4543.994701] can: request_module (can-proto-0) failed. [ 4544.421694] can: request_module (can-proto-0) failed. [ 4544.835251] can: request_module (can-proto-0) failed. [ 4545.354690] can: request_module (can-proto-0) failed. [ 4545.501969] can: request_module (can-proto-0) failed. [ 4545.601002] can: request_module (can-proto-0) failed. [ 4548.081926] can: request_module (can-proto-0) failed. [ 4548.115834] can: request_module (can-proto-0) failed. [ 4548.491177] can: request_module (can-proto-0) failed. [ 4548.873132] can: request_module (can-proto-0) failed. [ 4549.497664] can: request_module (can-proto-0) failed. [ 4549.572092] can: request_module (can-proto-0) failed. [ 4549.574026] systemd-journald[572]: Data hash table of /run/log/journal/d5d3542be8d8469cb02596ae71801d53/system.journal has a fill level at 75.0 (6997 of 9329 items, 5373952 file size, 768 bytes per hash table item), suggesting rotation. [ 4549.577144] systemd-journald[572]: /run/log/journal/d5d3542be8d8469cb02596ae71801d53/system.journal: Journal header limits reached or header out-of-date, rotating. [ 4549.620385] can: request_module (can-proto-0) failed. [ 4550.440349] can: request_module (can-proto-0) failed. [ 4550.756456] can: request_module (can-proto-0) failed. [ 4550.923308] can: request_module (can-proto-0) failed. [ 4552.507129] can: request_module (can-proto-0) failed. [ 4553.477128] can: request_module (can-proto-0) failed. [ 4553.834303] can: request_module (can-proto-0) failed. [ 4554.904166] can: request_module (can-proto-0) failed. [ 4555.416350] can: request_module (can-proto-0) failed. [ 4555.865399] can: request_module (can-proto-0) failed. [ 4555.987550] can: request_module (can-proto-0) failed. [ 4556.995164] can: request_module (can-proto-0) failed. [ 4557.709383] can: request_module (can-proto-0) failed. [ 4558.738174] can: request_module (can-proto-0) failed. [ 4559.131300] can: request_module (can-proto-0) failed. [ 4560.311692] can: request_module (can-proto-0) failed. [ 4560.359064] can: request_module (can-proto-0) failed. [ 4560.771430] can: request_module (can-proto-0) failed. [ 4561.534422] can: request_module (can-proto-0) failed. [ 4561.802481] can: request_module (can-proto-0) failed. [ 4562.112358] can: request_module (can-proto-0) failed. [ 4563.653572] can: request_module (can-proto-0) failed. [ 4563.666928] can: request_module (can-proto-0) failed. [ 4563.746847] can: request_module (can-proto-0) failed. [ 4563.922292] can: request_module (can-proto-0) failed. [ 4565.747704] can_create: 5 callbacks suppressed [ 4565.747716] can: request_module (can-proto-0) failed. [ 4566.259867] can: request_module (can-proto-0) failed. [ 4567.301876] can: request_module (can-proto-0) failed. [ 4567.658086] can: request_module (can-proto-0) failed. [ 4567.692284] can: request_module (can-proto-0) failed. [ 4567.769434] can: request_module (can-proto-0) failed. [ 4568.770160] can: request_module (can-proto-0) failed. [ 4570.039518] can: request_module (can-proto-0) failed. [ 4570.886197] can: request_module (can-proto-0) failed. [ 4571.348836] can: request_module (can-proto-0) failed. [ 4571.469371] can: request_module (can-proto-0) failed. [ 4571.534296] can: request_module (can-proto-0) failed. [ 4572.948006] can: request_module (can-proto-0) failed. [ 4573.056461] can: request_module (can-proto-0) failed. [ 4573.433410] can: request_module (can-proto-0) failed. [ 4573.792859] can: request_module (can-proto-0) failed. [ 4574.536458] can: request_module (can-proto-0) failed. [ 4574.579228] can: request_module (can-proto-0) failed. [ 4576.508948] can_create: 3 callbacks suppressed [ 4576.508958] can: request_module (can-proto-0) failed. [ 4576.562125] can: request_module (can-proto-0) failed. [ 4576.926634] can: request_module (can-proto-0) failed. [ 4577.046686] can: request_module (can-proto-0) failed. [ 4577.199452] can: request_module (can-proto-0) failed. [ 4577.346241] can: request_module (can-proto-0) failed. [ 4577.400447] can: request_module (can-proto-0) failed. [ 4577.526115] can: request_module (can-proto-0) failed. [ 4577.566508] can: request_module (can-proto-0) failed. [ 4578.188101] can: request_module (can-proto-0) failed. [ 4581.943944] can_create: 15 callbacks suppressed [ 4581.943959] can: request_module (can-proto-0) failed. [ 4582.204418] can: request_module (can-proto-0) failed. [ 4582.279431] can: request_module (can-proto-0) failed. [ 4583.063058] can: request_module (can-proto-0) failed. [ 4583.706904] can: request_module (can-proto-0) failed. [ 4583.997179] can: request_module (can-proto-0) failed. [ 4584.202669] can: request_module (can-proto-0) failed. [ 4584.949550] can: request_module (can-proto-0) failed. [ 4584.987051] can: request_module (can-proto-0) failed. [ 4585.252411] can: request_module (can-proto-0) failed. [ 4587.475425] can_create: 5 callbacks suppressed [ 4587.475437] can: request_module (can-proto-0) failed. [ 4587.649404] can: request_module (can-proto-0) failed. [ 4588.105499] can: request_module (can-proto-0) failed. [-- MARK -- Thu Feb 2 19:25:00 2023] [ 4588.716755] can: request_module (can-proto-0) failed. [ 4589.037394] can: request_module (can-proto-0) failed. [ 4590.324657] can: request_module (can-proto-0) failed. [ 4590.777265] can: request_module (can-proto-0) failed. [ 4593.556054] can: request_module (can-proto-0) failed. [ 4593.631160] can: request_module (can-proto-0) failed. [ 4593.813809] can: request_module (can-proto-0) failed. [ 4594.212725] can: request_module (can-proto-0) failed. [ 4594.248337] can: request_module (can-proto-0) failed. [ 4594.261717] can: request_module (can-proto-0) failed. [ 4594.577959] can: request_module (can-proto-0) failed. [ 4594.646924] can: request_module (can-proto-0) failed. [ 4595.040878] can: request_module (can-proto-0) failed. [ 4595.145265] can: request_module (can-proto-0) failed. [ 4599.640811] can_create: 7 callbacks suppressed [ 4599.640827] can: request_module (can-proto-0) failed. [ 4599.686047] can: request_module (can-proto-0) failed. [ 4600.960525] can: request_module (can-proto-0) failed. [ 4601.134319] can: request_module (can-proto-0) failed. [ 4601.222254] can: request_module (can-proto-0) failed. [ 4601.796439] can: request_module (can-proto-0) failed. [ 4602.882692] can: request_module (can-proto-0) failed. [ 4603.586775] can: request_module (can-proto-0) failed. [ 4604.865721] can: request_module (can-proto-0) failed. [ 4604.957645] can: request_module (can-proto-0) failed. [ 4605.345602] can: request_module (can-proto-0) failed. [ 4605.633548] can: request_module (can-proto-0) failed. [ 4605.672706] can: request_module (can-proto-0) failed. [ 4605.760276] can: request_module (can-proto-0) failed. [ 4606.032104] can: request_module (can-proto-0) failed. [ 4606.072962] can: request_module (can-proto-0) failed. [ 4606.149860] can: request_module (can-proto-0) failed. [ 4606.282030] can: request_module (can-proto-0) failed. [ 4610.291919] can_create: 8 callbacks suppressed [ 4610.291929] can: request_module (can-proto-0) failed. [ 4610.843613] can: request_module (can-proto-0) failed. [ 4611.516141] can: request_module (can-proto-0) failed. [ 4611.706162] can: request_module (can-proto-0) failed. [ 4613.321789] can: request_module (can-proto-0) failed. [ 4613.701832] can: request_module (can-proto-0) failed. [ 4613.952639] can: request_module (can-proto-0) failed. [ 4614.030302] can: request_module (can-proto-0) failed. [ 4614.852629] can: request_module (can-proto-0) failed. [ 4614.863502] can: request_module (can-proto-0) failed. [ 4616.239957] can_create: 2 callbacks suppressed [ 4616.239968] can: request_module (can-proto-0) failed. [ 4616.862903] can: request_module (can-proto-0) failed. [ 4617.710752] can: request_module (can-proto-0) failed. [ 4617.953533] can: request_module (can-proto-0) failed. [ 4618.236288] can: request_module (can-proto-0) failed. [ 4618.282368] can: request_module (can-proto-0) failed. [ 4618.576108] can: request_module (can-proto-0) failed. [ 4618.759263] can: request_module (can-proto-0) failed. [ 4618.781706] can: request_module (can-proto-0) failed. [ 4619.716068] can: request_module (can-proto-0) failed. [ 4621.947387] can_create: 1 callbacks suppressed [ 4621.947401] can: request_module (can-proto-0) failed. [ 4622.798618] can: request_module (can-proto-0) failed. [ 4623.184961] can: request_module (can-proto-0) failed. [ 4623.323854] can: request_module (can-proto-0) failed. [ 4623.530869] can: request_module (can-proto-0) failed. [ 4623.914706] can: request_module (can-proto-0) failed. [ 4624.414553] can: request_module (can-proto-0) failed. [ 4624.686181] can: request_module (can-proto-0) failed. [ 4625.849902] can: request_module (can-proto-0) failed. [ 4625.978152] can: request_module (can-proto-0) failed. [ 4626.965879] can_create: 1 callbacks suppressed [ 4626.965896] can: request_module (can-proto-0) failed. [ 4627.021627] can: request_module (can-proto-0) failed. [ 4627.479992] can: request_module (can-proto-0) failed. [ 4627.728141] can: request_module (can-proto-0) fa [ 4628.042136] can: request_module (can-proto-0) failed. [ 4628.526700] can: request_module (can-proto-0) failed. [ 4629.339673] can: request_module (can-proto-0) failed. [ 4629.513406] can: request_module (can-proto-0) failed. [ 4629.916358] can: request_module (can-proto-0) failed. [ 4630.052391] can: request_module (can-proto-0) failed. [ 4632.313943] can_create: 5 callbacks suppressed [ 4632.313956] can: request_module (can-proto-0) failed. [ 4632.396673] can: request_module (can-proto-0) failed. [ 4632.988867] can: request_module (can-proto-0) failed. [ 4633.685802] can: request_module (can-proto-0) failed. [ 4634.108051] can: request_module (can-proto-0) failed. [ 4634.361323] can: request_module (can-proto-0) failed. [ 4634.961840] can: request_module (can-proto-0) failed. [ 4635.133092] can: request_module (can-proto-0) failed. [ 4636.150289] can: request_module (can-proto-0) failed. [ 4636.269777] can: broadcast manager protocol [ 4636.383963] can: request_module (can-proto-0) failed. [ 4637.648114] can_create: 1 callbacks suppressed [ 4637.648126] can: request_module (can-proto-0) failed. [ 4638.039618] can: request_module (can-proto-0) failed. [ 4638.599309] can: request_module (can-proto-0) failed. [ 4639.113054] can: request_module (can-proto-0) failed. [ 4639.261099] can: request_module (can-proto-0) failed. [ 4639.461316] can: request_module (can-proto-0) failed. [ 4639.503372] can: request_module (can-proto-0) failed. [ 4640.919444] can: request_module (can-proto-0) failed. [ 4640.970467] can: request_module (can-proto-0) failed. [ 4641.112788] can: request_module (can-proto-0) failed. [ 4643.437732] can_create: 6 callbacks suppressed [ 4643.437748] can: request_module (can-proto-0) failed. [ 4643.683943] can: request_module (can-proto-0) failed. [ 4644.094305] can: request_module (can-proto-0) failed. [ 4644.296706] can: request_module (can-proto-0) failed. [ 4644.551198] can: request_module (can-proto-0) failed. [ 4645.084490] can: request_module (can-proto-0) failed. [ 4645.095679] can: request_module (can-proto-0) failed. [ 4645.268332] can: request_module (can-proto-0) failed. [ 4645.549962] can: request_module (can-proto-0) failed. [ 4645.813393] can: request_module (can-proto-0) failed. [ 4649.821833] can_create: 5 callbacks suppressed [ 4649.821844] can: request_module (can-proto-0) failed. [ 4649.897786] can: request_module (can-proto-0) failed. [ 4650.129338] can: request_module (can-proto-0) failed. [ 4650.336672] can: request_module (can-proto-0) failed. [ 4650.509868] can: request_module (can-proto-0) failed. [ 4651.078649] can: request_module (can-proto-0) failed. [ 4651.518007] can: request_module (can-proto-0) failed. [ 4651.746123] can: request_module (can-proto-0) failed. [ 4651.811707] can: request_module (can-proto-0) failed. [ 4652.255291] can: request_module (can-proto-0) failed. [ 4655.163508] can_create: 8 callbacks suppressed [ 4655.163522] can: request_module (can-proto-0) failed. [ 4655.186209] can: request_module (can-proto-0) failed. [ 4655.318234] can: request_module (can-proto-0) failed. [ 4655.460715] can: request_module (can-proto-0) failed. [ 4655.576567] can: request_module (can-proto-0) failed. [ 4655.992765] can: request_module (can-proto-0) failed. [ 4656.167262] can: request_module (can-proto-0) failed. [ 4656.887344] can: request_module (can-proto-0) failed. [ 4657.668955] can: request_module (can-proto-0) failed. [ 4658.177624] can: request_module (can-proto-0) failed. [ 4660.272815] can_create: 4 callbacks suppressed [ 4660.272825] can: request_module (can-proto-0) failed. [ 4660.535234] can: request_module (can-proto-0) failed. [ 4660.954577] can: request_module (can-proto-0) failed. [ 4660.985695] can: request_module (can-proto-0) failed. [ 4661.308056] can: request_module (can-proto-0) failed. [ 4661.488429] can: request_module (can-proto-0) failed. [ 4662.234335] can: request_module (can-proto-0) failed. [ 4662.414312] can: request_module (can-proto-0) failed. [ 4662.707899] can: request_module (can-proto-0) failed. [ 4662.996085] can: request_module (can-proto-0) failed. [ 4665.558626] can_create: 3 callbacks suppressed [ 4665.558636] can: request_module (can-proto-0) failed. [ 4665.581495] can: request_module (can-proto-0) failed. [ 4666.213934] can: request_module (can-proto-0) failed. [ 4666.582832] can: request_module (can-proto-0) failed. [ 4667.177639] can: request_module (can-proto-0) failed. [ 4667.413415] can: request_module (can-proto-0) failed. [ 4667.742718] can: request_module (can-proto-0) failed. [ 4668.048541] can: request_module (can-proto-0) failed. [ 4668.088805] can: request_module (can-proto-0) failed. [ 4668.722477] can: request_module (can-proto-0) failed. [ 4670.806869] can_create: 6 callbacks suppressed [ 4670.806880] can: request_module (can-proto-0) failed. [ 4671.538434] can: request_module (can-proto-0) failed. [ 4671.875629] can: request_module (can-proto-0) failed. [ 4672.228827] can: request_module (can-proto-0) failed. [ 4672.261096] can: request_module (can-proto-0) failed. [ 4673.386884] can: request_module (can-proto-0) failed. [ 4673.490419] can: request_module (can-proto-0) failed. [ 4673.607402] can: request_module (can-proto-0) failed. [ 4673.931038] can: request_module (can-proto-0) failed. [ 4675.010224] can: request_module (can-proto-0) failed. [ 4675.919025] can_create: 4 callbacks suppressed [ 4675.919040] can: request_module (can-proto-0) failed. [ 4675.968991] can: request_module (can-proto-0) failed. [ 4676.361341] can: request_module (can-proto-0) failed. [ 4676.442933] can: request_module (can-proto-0) failed. [ 4676.833083] can: request_module (can-proto-0) failed. [ 4677.334760] can: request_module (can-proto-0) failed. [ 4677.394756] can: request_module (can-proto-0) failed. [ 4677.936928] can: request_module (can-proto-0) failed. [ 4678.159892] can: request_module (can-proto-0) failed. [ 4678.338072] can: request_module (can-proto-0) failed. [ 4681.054891] can_create: 4 callbacks suppressed [ 4681.054906] can: request_module (can-proto-0) failed. [ 4681.108284] can: request_module (can-proto-0) failed. [ 4681.577528] can: request_module (can-proto-0) failed. [ 4681.669112] can: request_module (can-proto-0) failed. [ 4681.805395] can: request_module (can-proto-0) failed. [ 4681.829194] can: request_module (can-proto-0) failed. [ 4682.299635] can: request_module (can-proto-0) failed. [ 4682.361006] can: request_module (can-proto-0) failed. [ 4682.450567] can: request_module (can-proto-0) failed. [ 4683.130480] can: request_module (can-proto-0) failed. [ 4686.931183] can_create: 14 callbacks suppressed [ 4686.931195] can: request_module (can-proto-0) failed. [ 4687.552235] can: request_module (can-proto-0) failed. [ 4687.879644] can: request_module (can-proto-0) failed. [ 4688.351653] can: request_module (can-proto-0) failed. [ 4688.374450] can: request_module (can-proto-0) failed. [ 4688.588316] can: request_module (can-proto-0) failed. [ 4689.475217] can: request_module (can-proto-0) failed. [ 4690.435105] can: request_module (can-proto-0) failed. [ 4690.446589] can: request_module (can-proto-0) failed. [ 4690.544654] can: request_module (can-proto-0) failed. [ 4692.179604] can_create: 5 callbacks suppressed [ 4692.179630] can: request_module (can-proto-0) failed. [ 4693.529108] can: request_module (can-proto-0) failed. [ 4693.970872] can: request_module (can-proto-0) failed. [ 4694.057089] can: request_module (can-proto-0) failed. [ 4694.883921] can: request_module (can-proto-0) failed. [ 4695.622845] can: request_module (can-proto-0) failed. [ 4695.735300] can: request_module (can-proto-0) failed. [ 4696.568948] can: request_module (can-proto-0) failed. [ 4696.681152] can: request_module (can-proto-0) failed. [ 4697.265839] can: request_module (can-proto-0) failed. [ 4697.513526] can: request_module (can-proto-0) failed. [ 4697.818867] can: request_module (can-proto-0) failed. [ 4698.884215] can: request_module (can-proto-0) failed. [ 4699.116270] can: request_module (can-proto-0) failed. [ 4699.653332] can: request_module (can-proto-0) failed. [ 4699.942834] can: request_module (can-proto-0) failed. [ 4700.157514] can: request_module (can-proto-0) failed. [ 4700.179538] can: request_module (can-proto-0) failed. [ 4700.289772] can: request_module (can-proto-0) failed. [ 4703.424023] can_create: 4 callbacks suppressed [ 4703.424034] can: request_module (can-proto-0) failed. [ 4703.845255] can: request_module (can-proto-0) failed. [ 4704.102338] can: request_module (can-proto-0) failed. [ 4704.939316] can: request_module (can-proto-0) failed. [ 4705.777302] can: request_module (can-proto-0) failed. [ 4706.223425] can: request_module (can-proto-0) failed. [ 4706.819520] can: request_module (can-proto-0) failed. [ 4707.038895] can: request_module (can-proto-0) failed. [ 4707.471498] can: request_module (can-proto-0) failed. [ 4708.002636] can: request_module (can-proto-0) failed. [ 4709.213299] can_create: 1 callbacks suppressed [ 4709.213309] can: request_module (can-proto-0) failed. [ 4710.091728] can: request_module (can-proto-0) failed. [ 4710.105378] can: request_module (can-proto-0) failed. [ 4710.439822] can: request_module (can-proto-0) failed. [ 4712.324104] can: request_module (can-proto-0) failed. [ 4712.408618] can: request_module (can-proto-0) failed. [ 4712.492387] can: request_module (can-proto-0) failed. [ 4712.514187] can: request_module (can-proto-0) failed. [ 4712.611656] can: request_module (can-proto-0) failed. [ 4712.817557] can: request_module (can-proto-0) failed. [ 4714.621349] can_create: 1 callbacks suppressed [ 4714.621359] can: request_module (can-proto-0) failed. [ 4715.054149] can: request_module (can-proto-0) failed. [ 4715.096854] can: request_module (can-proto-0) failed. [ 4715.334972] can: request_module (can-proto-0) failed. [ 4715.596829] can: request_module (can-proto-0) failed. [ 4715.663462] can: request_module (can-proto-0) failed. [ 4716.118476] can: request_module (can-proto-0) failed. [ 4717.656687] can: request_module (can-proto-0) failed. [ 4718.712350] can: request_module (can-proto-0) failed. [ 4719.183624] can: request_module (can-proto-0) failed. [ 4719.676447] can_create: 2 callbacks suppressed [ 4719.676459] can: request_module (can-proto-0) failed. [ 4720.276001] can: request_module (can-proto-0) failed. [ 4721.299353] can: request_module (can-proto-0) failed. [ 4721.461879] can: request_module (can-proto-0) failed. [ 4722.962883] can: request_module (can-proto-0) failed. [ 4723.045450] can: request_module (can-proto-0) failed. [ 4723.255814] can: request_module (can-proto-0) failed. [ 4723.889191] can: request_module (can-proto-0) failed. [ 4724.656645] can: request_module (can-proto-0) failed. [ 4724.810500] can: request_module (can-proto-0) failed. [ 4724.833196] can: request_module (can-proto-0) failed. [ 4724.929593] can: request_module (can-proto-0) failed. [ 4725.319310] can: request_module (can-proto-0) failed. [ 4726.104204] can: request_module (can-proto-0) failed. [ 4726.129885] can: request_module (can-proto-0) failed. [ 4726.174975] can: request_module (can-proto-0) failed. [ 4726.433028] can: request_module (can-proto-0) failed. [ 4727.285556] can: request_module (can-proto-0) failed. [ 4727.796457] can: request_module (can-proto-0) failed. [ 4730.923566] can_create: 6 callbacks suppressed [ 4730.923576] can: request_module (can-proto-0) failed. [ 4731.155689] can: request_module (can-proto-0) failed. [ 4731.200393] can: request_module (can-proto-0) failed. [ 4731.872408] can: request_module (can-proto-0) failed. [ 4732.055536] can: request_module (can-proto-0) failed. [ 4732.331278] can: request_module (can-proto-0) failed. [ 4732.532357] can: request_module (can-proto-0) failed. [ 4732.658512] can: request_module (can-proto-0) failed. [ 4733.036999] can: request_module (can-proto-0) failed. [ 4733.714692] can: request_module (can-proto-0) failed. [ 4736.426884] can_create: 7 callbacks suppressed [ 4736.426897] can: request_module (can-proto-0) failed. [ 4736.590228] can: request_module (can-proto-0) failed. [ 4737.148887] can: request_module (can-proto-0) failed. [ 4737.160225] can: request_module (can-proto-0) failed. [ 4737.921890] can: request_module (can-proto-0) failed. [ 4737.932678] can: request_module (can-proto-0) failed. [ 4737.973040] can: request_module (can-proto-0) failed. [ 4738.102171] can: request_module (can-proto-0) failed. [ 4738.252433] can: request_module (can-proto-0) failed. [ 4738.358764] can: request_module (can-proto-0) failed. [ 4741.429027] can_create: 12 callbacks suppressed [ 4741.429042] can: request_module (can-proto-0) failed. [ 4741.732301] can: request_module (can-proto-0) failed. [ 4742.049920] can: request_module (can-proto-0) failed. [ 4742.574856] can: request_module (can-proto-0) failed. [ 4742.758300] can: request_module (can-proto-0) failed. [ 4743.126179] can: request_module (can-proto-0) failed. [ 4744.911387] can: request_module (can-proto-0) failed. [ 4745.176775] can: request_module (can-proto-0) failed. [ 4746.035037] can: request_module (can-proto-0) failed. [ 4746.281114] can: request_module (can-proto-0) failed. [ 4746.936143] can: request_module (can-proto-0) failed. [ 4747.228056] can: request_module (can-proto-0) failed. [ 4747.301352] can: request_module (can-proto-0) failed. [ 4748.042589] can: request_module (can-proto-0) failed. [ 4748.238422] can: request_module (can-proto-0) failed. [ 4749.327991] can: request_module (can-proto-0) failed. [ 4750.655358] can: request_module (can-proto-0) failed. [ 4751.123303] can: request_module (can-proto-0) failed. [ 4751.387098] can: request_module (can-proto-0) failed. [ 4751.434940] can: request_module (can-proto-0) failed. [ 4751.974958] can_create: 2 callbacks suppressed [ 4751.974975] can: request_module (can-proto-0) failed. [ 4752.175094] can: request_module (can-proto-0) failed. [ 4753.345454] can: request_module (can-proto-0) failed. [ 4753.567581] can: request_module (can-proto-0) failed. [ 4753.770119] can: request_module (can-proto-0) failed. [ 4754.058677] can: request_module (can-proto-0) failed. [ 4754.253207] can: request_module (can-proto-0) failed. [ 4755.628692] can: request_module (can-proto-0) failed. [ 4755.639630] can: request_module (can-proto-0) failed. [ 4755.953594] can: request_module (can-proto-0) failed. [ 4757.639651] can_create: 2 callbacks suppressed [ 4757.639660] can: request_module (can-proto-0) failed. [ 4758.077793] can: request_module (can-proto-0) failed. [ 4758.203606] can: request_module (can-proto-0) failed. [ 4758.676449] can: request_module (can-proto-0) failed. [ 4758.728365] can: request_module (can-proto-0) failed. [ 4759.172048] can: request_module (can-proto-0) failed. [ 4759.183676] can: request_module (can-proto-0) failed. [ 4759.543823] can: request_module (can-proto-0) failed. [ 4760.430339] can: request_module (can-proto-0) failed. [ 4761.594865] can: request_module (can-proto-0) failed. [ 4762.848084] can_create: 4 callbacks suppressed [ 4762.848096] can: request_module (can-proto-0) failed. [ 4762.859601] can: request_module (can-proto-0) failed. [ 4762.980970] can: request_module (can-proto-0) failed. [ 4763.045292] can: request_module (can-proto-0) failed. [ 4763.181394] can: request_module (can-proto-0) failed. [ 4763.320655] can: request_module (can-proto-0) failed. [ 4763.841277] can: request_module (can-proto-0) failed. [ 4764.874915] can: request_module (can-proto-0) failed. [ 4764.896436] can: request_module (can-proto-0) failed. [ 4765.073687] can: request_module (can-proto-0) failed. [ 4768.692154] can_create: 9 callbacks suppressed [ 4768.692162] can: request_module (can-proto-0) failed. [ 4769.027197] can: request_module (can-proto-0) failed. [ 4769.048622] can: request_module (can-proto-0) failed. [ 4769.232598] can: request_module (can-proto-0) failed. [ 4769.320100] can: request_module (can-proto-0) failed. [ 4769.484400] can: request_module (can-proto-0) failed. [ 4769.811834] can: request_module (can-proto-0) failed. [ 4770.713171] can: request_module (can-proto-0) failed. [ 4771.087391] can: request_module (can-proto-0) failed. [ 4771.506850] can: request_module (can-proto-0) failed. [ 4773.972186] can_create: 2 callbacks suppressed [ 4773.972196] can: request_module (can-proto-0) failed. [ 4774.932735] can: request_module (can-proto-0) failed. [ 4775.122204] can: request_module (can-proto-0) failed. [ 4775.204902] can: request_module (can-proto-0) failed. [ 4776.046129] can: request_module (can-proto-0) failed. [ 4776.950890] can: request_module (can-proto-0) failed. [ 4777.140848] can: request_module (can-proto-0) failed. [ 4777.365907] can: request_module (can-proto-0) failed. [ 4777.418042] can: request_module (can-proto-0) failed. [ 4777.657583] can: request_module (can-proto-0) failed. [ 4779.290846] can_create: 4 callbacks suppressed [ 4779.290855] can: request_module (can-proto-0) failed. [ 4779.521286] can: request_module (can-proto-0) failed. [ 4779.531684] can: request_module (can-proto-0) failed. [ 4779.584998] can: request_module (can-proto-0) failed. [ 4779.762447] can: request_module (can-proto-0) failed. [ 4780.015965] can: request_module (can-proto-0) failed. [ 4780.701746] can: request_module (can-proto-0) failed. [ 4780.915893] can: request_module (can-proto-0) failed. [ 4781.113863] can: request_module (can-proto-0) failed. [ 4781.184120] can: request_module (can-proto-0) failed. [ 4784.293799] can_create: 9 callbacks suppressed [ 4784.293807] can: request_module (can-proto-0) failed. [ 4784.768204] can: request_module (can-proto-0) failed. [ 4784.924518] Bluetooth: RFCOMM TTY layer initialized [ 4784.925725] Bluetooth: RFCOMM socket layer initialized [ 4784.926638] Bluetooth: RFCOMM ver 1.11 [ 4784.951163] can: request_module (can-proto-0) failed. [ 4786.554774] can: request_module (can-proto-0) failed. [ 4786.646024] can: request_module (can-proto-0) failed. [ 4787.283403] can: request_module (can-proto-0) failed. [ 4787.568597] can: request_module (can-proto-0) failed. [ 4787.857943] can: request_module (can-proto-0) failed. [ 4788.475497] can: request_module (can-proto-0) failed. [ 4788.486861] can: request_module (can-proto-0) failed. [ 4789.502437] can_create: 3 callbacks suppressed [ 4789.502449] can: request_module (can-proto-0) failed. [ 4790.060945] can: request_module (can-proto-0) failed. [ 4790.301707] can: request_module (can-proto-0) failed. [ 4790.473910] can: request_module (can-proto-0) failed. [ 4791.537359] can: request_module (can-proto-0) failed. [ 4791.581359] can: request_module (can-proto-0) failed. [ 4791.658343] can: request_module (can-proto-0) failed. [ 4792.167766] can: request_module (can-proto-0) failed. [ 4792.405261] can: request_module (can-proto-0) failed. [ 4793.314325] can: request_module (can-proto-0) failed. [ 4795.533520] can_create: 2 callbacks suppressed [ 4795.533529] can: request_module (can-proto-0) failed. [ 4795.678150] can: request_module (can-proto-0) failed. [ 4796.951624] can: request_module (can-proto-0) failed. [ 4797.608174] can: request_module (can-proto-0) failed. [ 4797.945358] can: request_module (can-proto-0) failed. [ 4798.260231] can: request_module (can-proto-0) failed. [ 4798.871347] can: request_module (can-proto-0) failed. [ 4798.963419] can: request_module (can-proto-0) failed. [ 4798.975432] can: request_module (can-proto-0) failed. [ 4799.187903] can: request_module (can-proto-0) failed. [ 4800.780019] can_create: 5 callbacks suppressed [ 4800.780028] can: request_module (can-proto-0) failed. [ 4800.915561] can: request_module (can-proto-0) failed. [ 4802.639056] can: request_module (can-proto-0) failed. [ 4802.659873] can: request_module (can-proto-0) failed. [ 4803.058822] can: request_module (can-proto-0) failed. [ 4803.565011] can: request_module (can-proto-0) failed. [ 4804.429301] can: request_module (can-proto-0) failed. [ 4804.629722] can: request_module (can-proto-0) failed. [ 4804.985017] can: request_module (can-proto-0) failed. [ 4806.007955] can: request_module (can-proto-0) failed. [ 4806.298635] can: request_module (can-proto-0) failed. [ 4806.449857] can: request_module (can-proto-0) failed. [ 4808.065397] can: request_module (can-proto-0) failed. [ 4808.131324] can: request_module (can-proto-0) failed. [ 4808.469280] can: request_module (can-proto-0) failed. [ 4809.805545] can: request_module (can-proto-0) failed. [ 4812.115306] can: request_module (can-proto-0) failed. [ 4812.445947] can: request_module (can-proto-0) failed. [ 4812.747490] can: request_module (can-proto-0) failed. [ 4813.080915] can: request_module (can-proto-0) failed. [ 4813.655318] can: request_module (can-proto-0) failed. [ 4813.843339] can: request_module (can-proto-0) failed. [ 4813.930796] can: request_module (can-proto-0) failed. [ 4814.009112] can: request_module (can-proto-0) failed. [ 4814.297939] can: request_module (can-proto-0) failed. [ 4814.415808] can: request_module (can-proto-0) failed. [ 4817.518252] can_create: 4 callbacks suppressed [ 4817.518260] can: request_module (can-proto-0) failed. [ 4817.950678] can: request_module (can-proto-0) failed. [ 4818.417600] can: request_module (can-proto-0) failed. [ 4818.975359] can: request_module (can-proto-0) failed. [ 4819.422038] can: request_module (can-proto-0) failed. [ 4819.786021] can: request_module (can-proto-0) failed. [ 4819.831213] can: request_module (can-proto-0) failed. [ 4821.075756] can: request_module (can-proto-0) failed. [ 4821.607954] can: request_module (can-proto-0) failed. [ 4821.660350] can: request_module (can-proto-0) failed. [ 4823.199539] can_create: 3 callbacks suppressed [ 4823.199548] can: request_module (can-proto-0) failed. [ 4823.425286] can: request_module (can-proto-0) failed. [ 4823.572812] can: request_module (can-proto-0) failed. [ 4824.439229] can: request_module (can-proto-0) failed. [ 4824.799662] can: request_module (can-proto-0) failed. [ 4825.264652] can: request_module (can-proto-0) failed. [ 4825.341381] can: request_module (can-proto-0) failed. [ 4825.498685] can: request_module (can-proto-0) failed. [ 4825.575327] can: request_module (can-proto-0) failed. [ 4825.921143] can: request_module (can-proto-0) failed. [ 4828.436018] can_create: 3 callbacks suppressed [ 4828.436028] can: request_module (can-proto-0) failed. [ 4829.107622] can: request_module (can-proto-0) failed. [ 4830.006248] can: request_module (can-proto-0) failed. [ 4830.219608] can: request_module (can-proto-0) failed. [ 4830.290190] can: request_module (can-proto-0) failed. [ 4830.302499] can: request_module (can-proto-0) failed. [ 4830.436714] can: request_module (can-proto-0) failed. [ 4830.600335] can: request_module (can-proto-0) failed. [ 4830.664696] can: request_module (can-proto-0) failed. [ 4831.342621] can: request_module (can-proto-0) failed. [ 4833.559074] can_create: 6 callbacks suppressed [ 4833.559083] can: request_module (can-proto-0) failed. [ 4834.072978] can: request_module (can-proto-0) failed. [ 4834.242508] can: request_module (can-proto-0) failed. [ 4834.326952] can: request_module (can-proto-0) failed. [ 4835.020189] can: request_module (can-proto-0) failed. [ 4835.529235] can: request_module (can-proto-0) failed. [ 4836.095138] can: request_module (can-proto-0) failed. [ 4837.208988] can: request_module (can-proto-0) failed. [ 4837.556845] can: request_module (can-proto-0) failed. [ 4837.619379] can: request_module (can-proto-0) failed. [ 4838.785472] can_create: 1 callbacks suppressed [ 4838.785487] can: request_module (can-proto-0) failed. [ 4838.900545] can: request_module (can-proto-0) failed. [ 4838.988612] can: request_module (can-proto-0) failed. [ 4839.479974] can: request_module (can-proto-0) failed. [ 4840.062706] can: request_module (can-proto-0) failed. [ 4840.269610] can: request_module (can-proto-0) failed. [ 4840.560392] can: request_module (can-proto-0) failed. [ 4840.715450] can: request_module (can-proto-0) failed. [ 4840.968676] can: request_module (can-proto-0) failed. [ 4841.379967] can: request_module (can-proto-0) failed. [ 4844.021036] can_create: 6 callbacks suppressed [ 4844.021045] can: request_module (can-proto-0) failed. [ 4845.122534] can: request_module (can-proto-0) failed. [ 4845.910002] can: request_module (can-proto-0) failed. [ 4845.985338] can: request_module (can-proto-0) failed. [ 4846.427379] can: request_module (can-proto-0) failed. [ 4846.636255] can: request_module (can-proto-0) failed. [ 4846.952377] can: request_module (can-proto-0) failed. [ 4848.123699] can: request_module (can-proto-0) failed. [ 4848.249392] can: request_module (can-proto-0) failed. [ 4848.270568] can: request_module (can-proto-0) failed. [ 4849.707439] can_create: 1 callbacks suppressed [ 4849.707448] can: request_module (can-proto-0) failed. [ 4850.730600] can: request_module (can-proto-0) failed. [ 4851.208065] can: request_module (can-proto-0) failed. [ 4852.673686] can: request_module (can-proto-0) failed. [ 4852.953461] can: request_module (can-proto-0) failed. [ 4854.317648] can: request_module (can-proto-0) failed. [ 4855.205187] can: request_module (can-proto-0) failed. [ 4855.314700] can: request_module (can-proto-0) failed. [ 4855.354872] can: request_module (can-proto-0) failed. [ 4856.855469] can: request_module (can-proto-0) failed. [ 4857.309818] can: request_module (can-proto-0) failed. [ 4857.533808] can: request_module (can-proto-0) failed. [ 4857.778464] can: request_module (can-proto-0) failed. [ 4857.791602] can: request_module (can-proto-0) failed. [ 4858.113606] can: request_module (can-proto-0) failed. [ 4858.932415] can: request_module (can-proto-0) failed. [ 4861.751055] can_create: 2 callbacks suppressed [ 4861.751076] can: request_module (can-proto-0) failed. [ 4862.108804] can: request_module (can-proto-0) failed. [ 4864.025740] can: request_module (can-proto-0) failed. [ 4864.190961] can: request_module (can-proto-0) failed. [ 4864.337480] can: request_module (can-proto-0) failed. [ 4864.577846] can: request_module (can-proto-0) failed. [ 4864.788882] can: request_module (can-proto-0) failed. [ 4864.917978] can: request_module (can-proto-0) failed. [ 4865.453172] can: request_module (can-proto-0) failed. [ 4865.596711] can: request_module (can-proto-0) failed. [ 4868.282443] can_create: 1 callbacks suppressed [ 4868.282455] can: request_module (can-proto-0) failed. [ 4868.394072] can: request_module (can-proto-0) failed. [ 4869.399675] can: request_module (can-proto-0) failed. [ 4870.104123] can: request_module (can-proto-0) failed. [ 4870.698359] can: request_module (can-proto-0) failed. [ 4872.202008] can: request_module (can-proto-0) failed. [ 4873.095308] can: request_module (can-proto-0) failed. [ 4873.360639] can: request_module (can-proto-0) failed. [ 4873.392779] can: request_module (can-proto-0) failed. [ 4873.802724] can: request_module (can-proto-0) failed. [ 4874.393013] can: request_module (can-proto-0) failed. [ 4874.560304] can: request_module (can-proto-0) failed. [ 4874.691193] can: request_module (can-proto-0) failed. [ 4874.821440] can: request_module (can-proto-0) failed. [ 4875.013218] can: request_module (can-proto-0) failed. [ 4875.174620] can: request_module (can-proto-0) failed. [ 4875.534418] can: request_module (can-proto-0) failed. [ 4880.202201] can_create: 9 callbacks suppressed [ 4880.202211] can: request_module (can-proto-0) failed. [ 4881.754992] can: request_module (can-proto-0) failed. [ 4881.930195] can: request_module (can-proto-0) failed. [ 4882.262431] can: request_module (can-proto-0) failed. [ 4883.635485] can: request_module (can-proto-0) failed. [ 4883.957651] can: request_module (can-proto-0) failed. [ 4885.257968] can: request_module (can-proto-0) failed. [ 4885.420731] can: request_module (can-proto-0) failed. [ 4886.655869] can: request_module (can-proto-0) failed. [ 4888.035848] can: request_module (can-proto-0) failed. [-- MARK -- Thu Feb 2 19:30:00 2023] [ 4888.552057] can: request_module (can-proto-0) failed. [ 4888.853908] can: request_module (can-proto-0) failed. [ 4889.083594] can: request_module (can-proto-0) failed. [ 4890.377963] can: request_module (can-proto-0) failed. [ 4890.766868] can: request_module (can-proto-0) failed. [ 4891.475521] can: request_module (can-proto-0) failed. [ 4891.819322] can: request_module (can-proto-0) failed. [ 4891.874573] can: request_module (can-proto-0) failed. [ 4892.278315] can: request_module (can-proto-0) failed. [ 4892.509462] can: request_module (can-proto-0) failed. [ 4893.108970] can: request_module (can-proto-0) failed. [ 4893.204777] can: request_module (can-proto-0) failed. [ 4893.575530] can: request_module (can-proto-0) failed. [ 4896.473830] can_create: 5 callbacks suppressed [ 4896.473840] can: request_module (can-proto-0) failed. [ 4896.697878] can: request_module (can-proto-0) failed. [ 4896.857040] can: request_module (can-proto-0) failed. [ 4897.548726] can: request_module (can-proto-0) failed. [ 4898.014911] can: request_module (can-proto-0) failed. [ 4898.405779] can: request_module (can-proto-0) failed. [ 4899.038201] can: request_module (can-proto-0) failed. [ 4899.493044] can: request_module (can-proto-0) failed. [ 4900.772171] can: request_module (can-proto-0) failed. [ 4901.244760] can: request_module (can-proto-0) failed. [ 4902.233891] can: request_module (can-proto-0) failed. [ 4902.509673] can: request_module (can-proto-0) failed. [ 4902.897731] can: request_module (can-proto-0) failed. [ 4903.206663] can: request_module (can-proto-0) failed. [ 4903.993331] can: request_module (can-proto-0) failed. [ 4904.365017] can: request_module (can-proto-0) failed. [ 4904.728802] can: request_module (can-proto-0) failed. [ 4907.266255] can: request_module (can-proto-0) failed. [ 4907.709481] can: request_module (can-proto-0) failed. [ 4908.404288] can: request_module (can-proto-0) failed. [ 4908.803425] can: request_module (can-proto-0) failed. [ 4909.392512] can: request_module (can-proto-0) failed. [ 4910.531255] can: request_module (can-proto-0) failed. [ 4910.783971] can: request_module (can-proto-0) failed. [ 4911.440597] can: request_module (can-proto-0) failed. [ 4911.462075] can: request_module (can-proto-0) failed. [ 4911.592001] can: request_module (can-proto-0) failed. [ 4912.457556] can: request_module (can-proto-0) failed. [ 4912.892054] can: request_module (can-proto-0) failed. [ 4913.456424] can: request_module (can-proto-0) failed. [ 4914.394738] can: request_module (can-proto-0) failed. [ 4914.539656] can: request_module (can-proto-0) failed. [ 4914.550613] can: request_module (can-proto-0) failed. [ 4914.767746] can: request_module (can-proto-0) failed. [ 4914.964834] can: request_module (can-proto-0) failed. [ 4915.056668] can: request_module (can-proto-0) failed. [ 4915.399314] can: request_module (can-proto-0) failed. [ 4918.011392] can_create: 6 callbacks suppressed [ 4918.011401] can: request_module (can-proto-0) failed. [ 4918.263539] can: request_module (can-proto-0) failed. [ 4918.443986] can: request_module (can-proto-0) failed. [ 4919.118129] can: request_module (can-proto-0) failed. [ 4919.945737] can: request_module (can-proto-0) failed. [ 4920.294579] can: request_module (can-proto-0) failed. [ 4920.328933] can: request_module (can-proto-0) failed. [ 4920.385474] can: request_module (can-proto-0) failed. [ 4920.501412] can: request_module (can-proto-0) failed. [ 4921.798272] can: request_module (can-proto-0) failed. [ 4923.519930] can_create: 2 callbacks suppressed [ 4923.519939] can: request_module (can-proto-0) failed. [ 4923.532327] can: request_module (can-proto-0) failed. [ 4924.055403] can: request_module (can-proto-0) failed. [ 4924.548730] can: request_module (can-proto-0) failed. [ 4924.950983] can: request_module (can-proto-0) failed. [ 4925.118369] can: request_module (can-proto-0) failed. [ 4925.825431] can: request_module (can-proto-0) failed. [ 4925.991105] can: request_module (can-proto-0) failed. [ 4926.075405] can: request_module (can-proto-0) failed. [ 4927.989875] can: request_module (can-proto-0) failed. [ 4928.719004] can_create: 2 callbacks suppressed [ 4928.719013] can: request_module (can-proto-0) failed. [ 4928.991295] can: request_module (can-proto-0) failed. [ 4930.279467] can: request_module (can-proto-0) failed. [ 4930.474896] can: request_module (can-proto-0) failed. [ 4931.408409] can: request_module (can-proto-0) failed. [ 4931.731139] can: request_module (can-proto-0) failed. [ 4932.435708] can: request_module (can-proto-0) failed. [ 4932.686006] can: request_module (can-proto-0) failed. [ 4933.563228] can: request_module (can-proto-0) failed. [ 4934.112827] can: request_module (can-proto-0) failed. [ 4934.130005] can: request_module (can-proto-0) failed. [ 4934.480018] can: request_module (can-proto-0) failed. [ 4934.708007] can: request_module (can-proto-0) failed. [ 4936.108400] can: request_module (can-proto-0) failed. [ 4936.173260] can: request_module (can-proto-0) failed. [ 4936.525551] can: request_module (can-proto-0) failed. [ 4937.051232] can: request_module (can-proto-0) failed. [ 4938.153791] can: request_module (can-proto-0) failed. [ 4938.832826] can: request_module (can-proto-0) failed. [ 4939.160244] can: request_module (can-proto-0) failed. [ 4939.255811] can: request_module (can-proto-0) failed. [ 4939.818677] can: request_module (can-proto-0) failed. [ 4940.545094] can: request_module (can-proto-0) failed. [ 4940.838305] can: request_module (can-proto-0) failed. [ 4940.874407] can: request_module (can-proto-0) failed. [ 4941.182552] can: request_module (can-proto-0) failed. [ 4942.062338] can: request_module (can-proto-0) failed. [ 4942.398586] can: request_module (can-proto-0) failed. [ 4942.638454] can: request_module (can-proto-0) failed. [ 4944.843313] can_create: 6 callbacks suppressed [ 4944.843323] can: request_module (can-proto-0) failed. [ 4944.941863] can: request_module (can-proto-0) failed. [ 4945.079340] can: request_module (can-proto-0) failed. [ 4945.315321] can: request_module (can-proto-0) failed. [ 4945.835338] can: request_module (can-proto-0) failed. [ 4946.637377] can: request_module (can-proto-0) failed. [ 4946.696693] can: request_module (can-proto-0) failed. [ 4946.841764] can: request_module (can-proto-0) failed. [ 4947.241115] can: request_module (can-proto-0) failed. [ 4947.313574] can: request_module (can-proto-0) failed. [ 4950.531345] can_create: 1 callbacks suppressed [ 4950.532110] can: request_module (can-proto-0) failed. [ 4950.954714] can: request_module (can-proto-0) failed. [ 4951.043801] can: request_module (can-proto-0) failed. [ 4951.314359] can: request_module (can-proto-0) failed. [ 4951.328938] can: request_module (can-proto-0) failed. [ 4951.423894] can: request_module (can-proto-0) failed. [ 4952.244256] can: request_module (can-proto-0) failed. [ 4952.309514] can: request_module (can-proto-0) failed. [ 4952.522947] can: request_module (can-proto-0) failed. [ 4953.193738] can: request_module (can-proto-0) failed. [ 4956.840692] can_create: 5 callbacks suppressed [ 4956.840724] can: request_module (can-proto-0) failed. [ 4956.919101] can: request_module (can-proto-0) failed. [ 4958.484819] can: request_module (can-proto-0) failed. [ 4959.037919] can: request_module (can-proto-0) failed. [ 4959.693332] can: request_module (can-proto-0) failed. [ 4960.870441] can: request_module (can-proto-0) failed. [ 4960.931927] can: request_module (can-proto-0) failed. [ 4961.416322] can: request_module (can-proto-0) failed. [ 4962.106930] can: request_module (can-proto-0) failed. [ 4962.929056] can: request_module (can-proto-0) failed. [ 4963.531066] can: request_module (can-proto-0) failed. [ 4964.126300] can: request_module (can-proto-0) failed. [ 4964.375346] can: request_module (can-proto-0) failed. [ 4964.387840] can: request_module (can-proto-0) failed. [ 4964.626582] can: request_module (can-proto-0) failed. [ 4965.051526] can: request_module (can-proto-0) failed. [ 4965.653291] can: request_module (can-proto-0) failed. [ 4966.474697] can: request_module (can-proto-0) failed. [ 4967.141079] can_create: 3 callbacks suppressed [ 4967.141089] can: request_module (can-proto-0) failed. [ 4967.781598] can: request_module (can-proto-0) failed. [ 4967.971005] can: request_module (can-proto-0) failed. [ 4968.001739] can: request_module (can-proto-0) failed. [ 4968.627804] can: request_module (can-proto-0) failed. [ 4969.498362] can: request_module (can-proto-0) failed. [ 4969.620026] can: request_module (can-proto-0) failed. [ 4970.246559] can: request_module (can-proto-0) failed. [ 4970.280649] can: request_module (can-proto-0) failed. [ 4970.469826] can: request_module (can-proto-0) failed. [ 4972.652860] can_create: 6 callbacks suppressed [ 4972.652871] can: request_module (can-proto-0) failed. [ 4972.994577] can: request_module (can-proto-0) failed. [ 4973.139564] can: request_module (can-proto-0) failed. [ 4974.080813] can: request_module (can-proto-0) failed. [ 4974.204582] can: request_module (can-proto-0) failed. [ 4974.248217] can: request_module (can-proto-0) failed. [ 4974.932254] can: request_module (can-proto-0) failed. [ 4975.151466] can: request_module (can-proto-0) failed. [ 4975.907062] can: request_module (can-proto-0) failed. [ 4976.142766] can: request_module (can-proto-0) failed. [ 4977.786379] can_create: 3 callbacks suppressed [ 4977.786387] can: request_module (can-proto-0) failed. [ 4980.368750] can: request_module (can-proto-0) failed. [ 4981.038837] can: request_module (can-proto-0) failed. [ 4981.396547] can: request_module (can-proto-0) failed. [ 4981.932138] can: request_module (can-proto-0) failed. [ 4982.201932] can: request_module (can-proto-0) failed. [ 4984.078110] can: request_module (can-proto-0) failed. [ 4984.162007] can: request_module (can-proto-0) failed. [ 4984.402551] can: request_module (can-proto-0) failed. [ 4985.509259] can: request_module (can-proto-0) failed. [ 4985.816464] can: request_module (can-proto-0) failed. [ 4985.838704] can: request_module (can-proto-0) failed. [ 4986.536368] can: request_module (can-proto-0) failed. [ 4987.073050] can: request_module (can-proto-0) failed. [ 4987.292695] can: request_module (can-proto-0) failed. [ 4987.512892] can: request_module (can-proto-0) failed. [ 4989.083795] can_create: 4 callbacks suppressed [ 4989.083803] can: request_module (can-proto-0) failed. [ 4989.191613] can: request_module (can-proto-0) failed. [ 4989.643861] can: request_module (can-proto-0) failed. [ 4989.667024] can: request_module (can-proto-0) failed. [ 4989.678468] can: request_module (can-proto-0) failed. [ 4991.023177] can: request_module (can-proto-0) failed. [ 4991.852895] can: request_module (can-proto-0) failed. [ 4991.938780] can: request_module (can-proto-0) failed. [ 4992.784326] can: request_module (can-proto-0) failed. [ 4992.806067] can: request_module (can-proto-0) failed. [ 4994.740352] can_create: 5 callbacks suppressed [ 4994.740361] can: request_module (can-proto-0) failed. [ 4994.903258] can: request_module (can-proto-0) failed. [ 4995.021210] can: request_module (can-proto-0) failed. [ 4995.095806] can: request_module (can-proto-0) failed. [ 4996.071507] can: request_module (can-proto-0) failed. [ 4996.258384] can: request_module (can-proto-0) failed. [ 4997.909719] can: request_module (can-proto-0) failed. [ 4998.360915] can: request_module (can-proto-0) failed. [ 4998.372985] can: request_module (can-proto-0) failed. [ 4999.310141] can: request_module (can-proto-0) failed. [ 5000.181071] can_create: 1 callbacks suppressed [ 5000.181080] can: request_module (can-proto-0) failed. [ 5000.620747] can: request_module (can-proto-0) failed. [ 5002.123356] can: request_module (can-proto-0) failed. [ 5002.894916] can: request_module (can-proto-0) failed. [ 5004.014902] can: request_module (can-proto-0) failed. [ 5004.725097] can: request_module (can-proto-0) failed. [ 5004.976563] can: request_module (can-proto-0) failed. [ 5005.053920] can: request_module (can-proto-0) failed. [ 5005.860572] can: request_module (can-proto-0) failed. [ 5005.884046] can: request_module (can-proto-0) failed. [ 5006.371162] can: request_module (can-proto-0) failed. [ 5006.614785] can: request_module (can-proto-0) failed. [ 5008.078998] can: request_module (can-proto-0) failed. [ 5008.415376] can: request_module (can-proto-0) failed. [ 5008.893483] can: request_module (can-proto-0) failed. [ 5009.120337] can: request_module (can-proto-0) failed. [ 5010.754151] can: request_module (can-proto-0) failed. [ 5011.086057] can: request_module (can-proto-0) failed. [ 5011.765530] can: request_module (can-proto-0) failed. [ 5012.191349] can: request_module (can-proto-0) failed. [ 5012.290193] can: request_module (can-proto-0) failed. [ 5012.737837] can: request_module (can-proto-0) failed. [ 5012.754101] can: request_module (can-proto-0) failed. [ 5013.291739] can: request_module (can-proto-0) failed. [ 5014.511405] can: request_module (can-proto-0) failed. [ 5014.863854] can: request_module (can-proto-0) failed. [ 5014.910224] can: request_module (can-proto-0) failed. [ 5016.191497] can_create: 2 callbacks suppressed [ 5016.191506] can: request_module (can-proto-0) failed. [ 5016.620691] can: request_module (can-proto-0) failed. [ 5017.198409] can: request_module (can-proto-0) failed. [ 5018.171931] can: request_module (can-proto-0) failed. [ 5019.532757] can: request_module (can-proto-0) failed. [ 5019.605277] can: request_module (can-proto-0) failed. [ 5019.721092] can: request_module (can-proto-0) failed. [ 5020.130411] can: request_module (can-proto-0) failed. [ 5020.598782] can: request_module (can-proto-0) failed. [ 5020.846778] can: request_module (can-proto-3) failed. [ 5022.593351] can_create: 1 callbacks suppressed [ 5022.593360] can: request_module (can-proto-0) failed. [ 5022.875436] can: request_module (can-proto-0) failed. [ 5022.958116] can: request_module (can-proto-0) failed. [ 5022.971195] can: request_module (can-proto-0) failed. [ 5025.990784] can: request_module (can-proto-0) failed. [ 5026.058389] can: request_module (can-proto-0) failed. [ 5027.546596] can: request_module (can-proto-0) failed. [ 5027.893539] can: request_module (can-proto-0) failed. [ 5027.934557] can: request_module (can-proto-0) failed. [ 5027.976876] can: request_module (can-proto-0) failed. [ 5028.214514] can: request_module (can-proto-0) failed. [ 5028.245441] can: request_module (can-proto-0) failed. [ 5028.318219] can: request_module (can-proto-0) failed. [ 5028.443872] can: request_module (can-proto-0) failed. [ 5029.495837] can: request_module (can-proto-0) failed. [ 5029.866625] can: request_module (can-proto-0) failed. [ 5031.174102] can: request_module (can-proto-0) failed. [ 5034.085366] can_create: 8 callbacks suppressed [ 5034.085375] can: request_module (can-proto-0) failed. [ 5035.070179] can: request_module (can-proto-0) failed. [ 5035.166638] can: request_module (can-proto-0) failed. [ 5035.751383] can: request_module (can-proto-0) failed. [ 5035.977974] can: request_module (can-proto-0) failed. [ 5036.269186] can: request_module (can-proto-0) failed. [ 5036.438359] can: request_module (can-proto-0) failed. [ 5036.720525] can: request_module (can-proto-0) failed. [ 5036.752564] can: request_module (can-proto-0) failed. [ 5036.981117] can: request_module (can-proto-0) failed. [ 5039.443543] can_create: 4 callbacks suppressed [ 5039.443574] can: request_module (can-proto-0) failed. [ 5039.768675] can: request_module (can-proto-0) failed. [ 5039.820487] can: request_module (can-proto-0) failed. [ 5041.600719] can: request_module (can-proto-0) failed. [ 5041.711632] can: request_module (can-proto-0) failed. [ 5041.867562] can: request_module (can-proto-0) failed. [ 5042.049074] can: request_module (can-proto-0) failed. [ 5042.262720] can: request_module (can-proto-0) failed. [ 5042.353669] can: request_module (can-proto-0) failed. [ 5042.613582] can: request_module (can-proto-0) failed. [ 5044.873716] can_create: 2 callbacks suppressed [ 5044.873725] can: request_module (can-proto-0) failed. [ 5044.912598] can: request_module (can-proto-0) failed. [ 5045.308872] can: request_module (can-proto-0) failed. [ 5045.793398] can: request_module (can-proto-0) failed. [ 5046.016146] can: request_module (can-proto-0) failed. [ 5046.484462] can: request_module (can-proto-0) failed. [ 5046.681150] can: request_module (can-proto-0) failed. [ 5046.838513] can: request_module (can-proto-0) failed. [ 5046.897174] can: request_module (can-proto-0) failed. [ 5047.361312] can: request_module (can-proto-0) failed. [ 5050.682767] can_create: 5 callbacks suppressed [ 5050.682775] can: request_module (can-proto-0) failed. [ 5051.056784] can: request_module (can-proto-0) failed. [ 5051.410512] can: request_module (can-proto-0) failed. [ 5051.968446] can: request_module (can-proto-0) failed. [ 5052.332642] can: request_module (can-proto-0) failed. [ 5052.415335] can: request_module (can-proto-0) failed. [ 5053.190813] can: request_module (can-proto-0) failed. [ 5053.474276] can: request_module (can-proto-0) failed. [ 5054.234263] can: request_module (can-proto-0) failed. [ 5054.408655] can: request_module (can-proto-0) failed. [ 5057.347539] can_create: 7 callbacks suppressed [ 5057.347549] can: request_module (can-proto-0) failed. [ 5057.394997] can: request_module (can-proto-0) failed. [ 5057.425503] can: request_module (can-proto-0) failed. [ 5057.613555] can: request_module (can-proto-0) failed. [ 5057.624246] can: request_module (can-proto-0) failed. [ 5058.854916] can: request_module (can-proto-0) failed. [ 5059.737050] can: request_module (can-proto-0) failed. [ 5060.299458] can: request_module (can-proto-0) failed. [ 5060.910516] can: request_module (can-proto-0) failed. [ 5061.304559] can: request_module (can-proto-0) failed. [ 5063.106651] can_create: 2 callbacks suppressed [ 5063.106706] can: request_module (can-proto-0) failed. [ 5063.493636] can: request_module (can-proto-0) failed. [ 5064.339082] can: request_module (can-proto-0) failed. [ 5064.847742] can: request_module (can-proto-0) failed. [ 5064.965099] can: request_module (can-proto-0) failed. [ 5065.315264] can: request_module (can-proto-0) failed. [ 5065.753808] can: request_module (can-proto-0) failed. [ 5066.020746] can: request_module (can-proto-0) failed. [ 5066.652861] can: request_module (can-proto-0) failed. [ 5066.686570] can: request_module (can-proto-0) failed. [ 5068.108547] can_create: 5 callbacks suppressed [ 5068.108561] can: request_module (can-proto-0) failed. [ 5068.253505] can: request_module (can-proto-0) failed. [ 5068.514191] can: request_module (can-proto-0) failed. [ 5069.015920] can: request_module (can-proto-0) failed. [ 5070.119747] can: request_module (can-proto-0) failed. [ 5070.190201] can: request_module (can-proto-0) failed. [ 5070.687852] can: request_module (can-proto-0) failed. [ 5071.113231] can: request_module (can-proto-0) failed. [ 5072.020259] can: request_module (can-proto-0) failed. [ 5072.039559] can: request_module (can-proto-0) failed. [ 5073.480888] can_create: 3 callbacks suppressed [ 5073.480900] can: request_module (can-proto-0) failed. [ 5073.921958] can: request_module (can-proto-0) failed. [ 5074.407056] can: request_module (can-proto-0) failed. [ 5074.787377] can: request_module (can-proto-0) failed. [ 5075.529020] can: request_module (can-proto-0) failed. [ 5075.826843] can: request_module (can-proto-0) failed. [ 5076.434601] can: request_module (can-proto-0) failed. [ 5077.135903] can: request_module (can-proto-0) failed. [ 5100.509085] Running test [R:13327125 T:12 - Libkcapi AF_ALG test - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [-- MARK -- Thu Feb 2 19:35:00 2023] [ 5204.847478] alg: No test for fips(ansi_cprng) (fips_ansi_cprng) [-- MARK -- Thu Feb 2 19:40:00 2023] [-- MARK -- Thu Feb 2 19:45:00 2023] [-- MARK -- Thu Feb 2 19:50:00 2023] [ 6207.804452] Running test [R:13327125 T:13 - kselftests rhel - net - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [ 6249.377562] l2tp_core: L2TP core driver, V2.0 [ 6249.405636] l2tp_netlink: L2TP netlink interface [ 6249.411820] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3) [ 6249.425823] l2tp_ip: L2TP IP encapsulation support (L2TPv3) [ 6249.436657] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3) [ 6253.399056] systemd-rc-local-generator[253318]: /etc/rc.d/rc.local is not marked executable, skipping. [ 6378.999629] test_bpf: #0 TAX jited:1 38 37 37 PASS [ 6379.007293] test_bpf: #1 TXA jited:1 26 38 27 PASS [ 6379.008480] test_bpf: #2 ADD_SUB_MUL_K jited:1 27 PASS [ 6379.009468] test_bpf: #3 DIV_MOD_KX jited:1 37 PASS [ 6379.010451] test_bpf: #4 AND_OR_LSH_K jited:1 38 27 PASS [ 6379.011491] test_bpf: #5 LD_IMM_0 jited:1 28 PASS [ 6379.012437] test_bpf: #6 LD_IND jited:1 45 46 46 PASS [ 6379.013569] test_bpf: #7 LD_ABS jited:1 46 47 45 PASS [ 6379.014727] test_bpf: #8 LD_ABS_LL jited:1 73 75 PASS [ 6379.015857] test_bpf: #9 LD_IND_LL jited:1 50 51 51 PASS [ 6379.017065] test_bpf: #10 LD_ABS_NET jited:1 71 73 PASS [ 6379.018207] test_bpf: #11 LD_IND_NET jited:1 48 49 48 PASS [ 6379.019403] test_bpf: #12 LD_PKTTYPE jited:1 31 29 PASS [ 6379.020609] test_bpf: #13 LD_MARK jited:1 26 26 PASS [ 6379.021630] test_bpf: #14 LD_RXHASH jited:1 26 27 PASS [ 6379.022669] test_bpf: #15 LD_QUEUE jited:1 26 27 PASS [ 6379.023675] test_bpf: #16 LD_PROTOCOL jited:1 31 30 PASS [ 6379.024775] test_bpf: #17 LD_VLAN_TAG jited:1 25 43 PASS [ 6379.025798] test_bpf: #18 LD_VLAN_TAG_PRESENT jited:1 26 26 PASS [ 6379.026936] test_bpf: #19 LD_IFINDEX jited:1 28 27 PASS [ 6379.028006] test_bpf: #20 LD_HATYPE jited:1 28 27 PASS [ 6379.029024] test_bpf: #21 LD_CPU jited:1 36 36 PASS [ 6379.030102] test_bpf: #22 LD_NLATTR jited:1 36 46 PASS [ 6379.031171] test_bpf: #23 LD_NLATTR_NEST jited:1 111 244 PASS [ 6379.032618] test_bpf: #24 LD_PAYLOAD_OFF jited:1 1396 1490 PASS [ 6379.036619] test_bpf: #25 LD_ANC_XOR jited:1 27 26 PASS [ 6379.037656] test_bpf: #26 SPILL_FILL jited:1 28 28 28 PASS [ 6379.038790] test_bpf: #27 JEQ jited:1 71 29 29 PASS [ 6379.039865] test_bpf: #28 JGT jited:1 47 27 29 PASS [ 6379.040931] test_bpf: #29 JGE (jt 0), test 1 jited:1 47 29 28 PASS [ 6379.042187] test_bpf: #30 JGE (jt 0), test 2 jited:1 30 29 29 PASS [ 6379.043415] test_bpf: #31 JGE jited:1 47 40 40 PASS [ 6379.044518] test_bpf: #32 JSET jited:1 41 42 44 PASS [ 6379.045660] test_bpf: #33 tcpdump port 22 jited:1 47 54 60 PASS [ 6379.046969] test_bpf: #34 tcpdump complex jited:1 48 54 76 PASS [ 6379.048328] test_bpf: #35 RET_A jited:1 26 27 PASS [ 6379.049303] test_bpf: #36 INT: ADD trivial jited:1 27 PASS [ 6379.050292] test_bpf: #37 INT: MUL_X jited:1 27 PASS [ 6379.051217] test_bpf: #38 INT: MUL_X2 jited:1 28 PASS [ 6379.052149] test_bpf: #39 INT: MUL32_X jited:1 29 PASS [ 6379.053101] test_bpf: #40 INT: ADD 64-bit jited:1 43 PASS [ 6379.054144] test_bpf: #41 INT: ADD 32-bit jited:1 42 PASS [ 6379.055168] test_bpf: #42 INT: SUB jited:1 39 PASS [ 6379.056177] test_bpf: #43 INT: XOR jited:1 38 PASS [ 6379.057132] test_bpf: #44 INT: MUL jited:1 34 PASS [ 6379.058063] test_bpf: #45 MOV REG64 jited:1 29 PASS [ 6379.058958] test_bpf: #46 MOV REG32 jited:1 30 PASS [ 6379.059899] test_bpf: #47 LD IMM64 jited:1 29 PASS [ 6379.060821] test_bpf: #48 INT: ALU MIX jited:1 73 PASS [ 6379.061792] test_bpf: #49 INT: shifts by register jited:1 34 PASS [ 6379.063037] test_bpf: #50 check: missing ret PASS [ 6379.063834] test_bpf: #51 check: div_k_0 PASS [ 6379.064589] test_bpf: #52 check: unknown insn PASS [ 6379.065384] test_bpf: #53 check: out of range spill/fill PASS [ 6379.066318] test_bpf: #54 JUMPS + HOLES jited:1 32 PASS [ 6379.067665] test_bpf: #55 check: RET X PASS [ 6379.068383] test_bpf: #56 check: LDX + RET X PASS [ 6379.069185] test_bpf: #57 M[]: alt STX + LDX jited:1 37 PASS [ 6379.070290] test_bpf: #58 M[]: full STX + full LDX jited:1 31 PASS [ 6379.071440] test_bpf: #59 check: SKF_AD_MAX PASS [ 6379.072220] test_bpf: #60 LD [SKF_AD_OFF-1] jited:1 47 PASS [ 6379.073301] test_bpf: #61 load 64-bit immediate jited:1 28 PASS [ 6379.074359] test_bpf: #62 ALU_MOV_X: dst = 2 jited:1 25 PASS [ 6379.075385] test_bpf: #63 ALU_MOV_X: dst = 4294967295 jited:1 25 PASS [ 6379.076510] test_bpf: #64 ALU64_MOV_X: dst = 2 jited:1 25 PASS [ 6379.077562] test_bpf: #65 ALU64_MOV_X: dst = 4294967295 jited:1 25 PASS [ 6379.078715] test_bpf: #66 ALU_MOV_K: dst = 2 jited:1 26 PASS [ 6379.079744] test_bpf: #67 ALU_MOV_K: dst = 4294967295 jited:1 26 PASS [ 6379.080859] test_bpf: #68 ALU_MOV_K: 0x0000ffffffff0000 = 0x00000000ffffffff jited:1 27 PASS [ 6379.082273] test_bpf: #69 ALU_MOV_K: small negative jited:1 26 PASS [ 6379.083370] test_bpf: #70 ALU_MOV_K: small negative zero extension jited:1 26 PASS [ 6379.084645] test_bpf: #71 ALU_MOV_K: large negative jited:1 27 PASS [ 6379.085744] test_bpf: #72 ALU_MOV_K: large negative zero extension jited:1 25 PASS [ 6379.087017] test_bpf: #73 ALU64_MOV_K: dst = 2 jited:1 26 PASS [ 6379.088053] test_bpf: #74 ALU64_MOV_K: dst = 2147483647 jited:1 26 PASS [ 6379.089171] test_bpf: #75 ALU64_OR_K: dst = 0x0 jited:1 27 PASS [ 6379.090224] test_bpf: #76 ALU64_MOV_K: dst = -1 jited:1 28 PASS [ 6379.091272] test_bpf: #77 ALU64_MOV_K: small negative jited:1 25 PASS [ 6379.092360] test_bpf: #78 ALU64_MOV_K: small negative sign extension jited:1 26 PASS [ 6379.093626] test_bpf: #79 ALU64_MOV_K: large negative jited:1 25 PASS [ 6379.094721] test_bpf: #80 ALU64_MOV_K: large negative sign extension jited:1 27 PASS [ 6379.096053] test_bpf: #81 ALU_ADD_X: 1 + 2 = 3 jited:1 26 PASS [ 6379.097081] test_bpf: #82 ALU_ADD_X: 1 + 4294967294 = 4294967295 jited:1 26 PASS [ 6379.098304] test_bpf: #83 ALU_ADD_X: 2 + 4294967294 = 0 jited:1 27 PASS [ 6379.099430] test_bpf: #84 ALU64_ADD_X: 1 + 2 = 3 jited:1 26 PASS [ 6379.100465] test_bpf: #85 ALU64_ADD_X: 1 + 4294967294 = 4294967295 jited:1 36 PASS [ 6379.101708] test_bpf: #86 ALU64_ADD_X: 2 + 4294967294 = 4294967296 jited:1 27 PASS [ 6379.102943] test_bpf: #87 ALU_ADD_K: 1 + 2 = 3 jited:1 26 PASS [ 6379.103965] test_bpf: #88 ALU_ADD_K: 3 + 0 = 3 jited:1 25 PASS [ 6379.105018] test_bpf: #89 ALU_ADD_K: 1 + 4294967294 = 4294967295 jited:1 27 PASS [ 6379.106244] test_bpf: #90 ALU_ADD_K: 4294967294 + 2 = 0 jited:1 27 PASS [ 6379.107433] test_bpf: #91 ALU_ADD_K: 0 + (-1) = 0x00000000ffffffff jited:1 28 PASS [ 6379.108695] test_bpf: #92 ALU_ADD_K: 0 + 0xffff = 0xffff jited:1 27 PASS [ 6379.109856] test_bpf: #93 ALU_ADD_K: 0 + 0x7fffffff = 0x7fffffff jited:1 27 PASS [ 6379.111109] test_bpf: #94 ALU_ADD_K: 0 + 0x80000000 = 0x80000000 jited:1 27 PASS [ 6379.112339] test_bpf: #95 ALU_ADD_K: 0 + 0x80008000 = 0x80008000 jited:1 27 PASS [ 6379.113561] test_bpf: #96 ALU64_ADD_K: 1 + 2 = 3 jited:1 26 PASS [ 6379.114617] test_bpf: #97 ALU64_ADD_K: 3 + 0 = 3 jited:1 26 PASS [ 6379.115672] test_bpf: #98 ALU64_ADD_K: 1 + 2147483646 = 2147483647 jited:1 25 PASS [ 6379.116925] test_bpf: #99 ALU64_ADD_K: 4294967294 + 2 = 4294967296 jited:1 28 PASS [ 6379.118202] test_bpf: #100 ALU64_ADD_K: 2147483646 + -2147483647 = -1 jited:1 27 PASS [ 6379.119481] test_bpf: #101 ALU64_ADD_K: 1 + 0 = 1 jited:1 38 PASS [ 6379.120541] test_bpf: #102 ALU64_ADD_K: 0 + (-1) = 0xffffffffffffffff jited:1 28 PASS [ 6379.121834] test_bpf: #103 ALU64_ADD_K: 0 + 0xffff = 0xffff jited:1 26 PASS [ 6379.123019] test_bpf: #104 ALU64_ADD_K: 0 + 0x7fffffff = 0x7fffffff jited:1 27 PASS [ 6379.125388] test_bpf: #105 ALU64_ADD_K: 0 + 0x80000000 = 0xffffffff80000000 jited:1 28 PASS [ 6379.126740] test_bpf: #106 ALU_ADD_K: 0 + 0x80008000 = 0xffffffff80008000 jited:1 27 PASS [ 6379.128053] test_bpf: #107 ALU_SUB_X: 3 - 1 = 2 jited:1 27 PASS [ 6379.129169] test_bpf: #108 ALU_SUB_X: 4294967295 - 4294967294 = 1 jited:1 27 PASS [ 6379.130405] test_bpf: #109 ALU64_SUB_X: 3 - 1 = 2 jited:1 26 PASS [ 6379.131457] test_bpf: #110 ALU64_SUB_X: 4294967295 - 4294967294 = 1 jited:1 26 PASS [ 6379.132716] test_bpf: #111 ALU_SUB_K: 3 - 1 = 2 jited:1 26 PASS [ 6379.133753] test_bpf: #112 ALU_SUB_K: 3 - 0 = 3 jited:1 26 PASS [ 6379.134785] test_bpf: #113 ALU_SUB_K: 4294967295 - 4294967294 = 1 jited:1 26 PASS [ 6379.136024] test_bpf: #114 ALU64_SUB_K: 3 - 1 = 2 jited:1 26 PASS [ 6379.137070] test_bpf: #115 ALU64_SUB_K: 3 - 0 = 3 jited:1 25 PASS [ 6379.138133] test_bpf: #116 ALU64_SUB_K: 4294967294 - 4294967295 = -1 jited:1 26 PASS [ 6379.139424] test_bpf: #117 ALU64_ADD_K: 2147483646 - 2147483647 = -1 jited:1 44 PASS [ 6379.140793] test_bpf: #118 ALU_MUL_X: 2 * 3 = 6 jited:1 26 PASS [ 6379.141838] test_bpf: #119 ALU_MUL_X: 2 * 0x7FFFFFF8 = 0xFFFFFFF0 jited:1 52 PASS [ 6379.143099] test_bpf: #120 ALU_MUL_X: -1 * -1 = 1 jited:1 26 PASS [ 6379.144150] test_bpf: #121 ALU64_MUL_X: 2 * 3 = 6 jited:1 26 PASS [ 6379.145200] test_bpf: #122 ALU64_MUL_X: 1 * 2147483647 = 2147483647 jited:1 26 PASS [ 6379.146447] test_bpf: #123 ALU64_MUL_X: 64x64 multiply, low word jited:1 26 PASS [ 6379.147670] test_bpf: #124 ALU64_MUL_X: 64x64 multiply, high word jited:1 27 PASS [ 6379.148900] test_bpf: #125 ALU_MUL_K: 2 * 3 = 6 jited:1 26 PASS [ 6379.149923] test_bpf: #126 ALU_MUL_K: 3 * 1 = 3 jited:1 26 PASS [ 6379.150949] test_bpf: #127 ALU_MUL_K: 2 * 0x7FFFFFF8 = 0xFFFFFFF0 jited:1 25 PASS [ 6379.152200] test_bpf: #128 ALU_MUL_K: 1 * (-1) = 0x00000000ffffffff jited:1 27 PASS [ 6379.153446] test_bpf: #129 ALU64_MUL_K: 2 * 3 = 6 jited:1 26 PASS [ 6379.154496] test_bpf: #130 ALU64_MUL_K: 3 * 1 = 3 jited:1 25 PASS [ 6379.155544] test_bpf: #131 ALU64_MUL_K: 1 * 2147483647 = 2147483647 jited:1 26 PASS [ 6379.156800] test_bpf: #132 ALU64_MUL_K: 1 * -2147483647 = -2147483647 jited:1 26 PASS [ 6379.158129] test_bpf: #133 ALU64_MUL_K: 1 * (-1) = 0xffffffffffffffff jited:1 27 PASS [ 6379.159568] test_bpf: #134 ALU64_MUL_K: 64x32 multiply, low word jited:1 29 PASS [ 6379.160991] test_bpf: #135 ALU64_MUL_K: 64x32 multiply, high word jited:1 26 PASS [ 6379.162264] test_bpf: #136 ALU_DIV_X: 6 / 2 = 3 jited:1 25 PASS [ 6379.163293] test_bpf: #137 ALU_DIV_X: 4294967295 / 4294967295 = 1 jited:1 26 PASS [ 6379.164598] test_bpf: #138 ALU64_DIV_X: 6 / 2 = 3 jited:1 31 PASS [ 6379.165681] test_bpf: #139 ALU64_DIV_X: 2147483647 / 2147483647 = 1 jited:1 31 PASS [ 6379.166946] test_bpf: #140 ALU64_DIV_X: 0xffffffffffffffff / (-1) = 0x0000000000000001 jited:1 31 PASS [ 6379.168426] test_bpf: #141 ALU_DIV_K: 6 / 2 = 3 jited:1 26 PASS [ 6379.169505] test_bpf: #142 ALU_DIV_K: 3 / 1 = 3 jited:1 26 PASS [ 6379.170560] test_bpf: #143 ALU_DIV_K: 4294967295 / 4294967295 = 1 jited:1 25 PASS [ 6379.171796] test_bpf: #144 ALU_DIV_K: 0xffffffffffffffff / (-1) = 0x1 jited:1 29 PASS [ 6379.173081] test_bpf: #145 ALU64_DIV_K: 6 / 2 = 3 jited:1 31 PASS [ 6379.174147] test_bpf: #146 ALU64_DIV_K: 3 / 1 = 3 jited:1 32 PASS [ 6379.175219] test_bpf: #147 ALU64_DIV_K: 2147483647 / 2147483647 = 1 jited:1 32 PASS [ 6379.176481] test_bpf: #148 ALU64_DIV_K: 0xffffffffffffffff / (-1) = 0x0000000000000001 jited:1 32 PASS [ 6379.178059] test_bpf: #149 ALU_MOD_X: 3 % 2 = 1 jited:1 26 PASS [ 6379.179430] test_bpf: #150 ALU_MOD_X: 4294967295 % 4294967293 = 2 jited:1 36 PASS [ 6379.180717] test_bpf: #151 ALU64_MOD_X: 3 % 2 = 1 jited:1 31 PASS [ 6379.181772] test_bpf: #152 ALU64_MOD_X: 2147483647 % 2147483645 = 2 jited:1 31 PASS [ 6379.183063] test_bpf: #153 ALU_MOD_K: 3 % 2 = 1 jited:1 26 PASS [ 6379.184116] test_bpf: #154 ALU_MOD_K: 3 % 1 = 0 jited:1 26 PASS [ 6379.185137] test_bpf: #155 ALU_MOD_K: 4294967295 % 4294967293 = 2 jited:1 26 PASS [ 6379.186365] test_bpf: #156 ALU64_MOD_K: 3 % 2 = 1 jited:1 31 PASS [ 6379.187413] test_bpf: #157 ALU64_MOD_K: 3 % 1 = 0 jited:1 31 PASS [ 6379.188462] test_bpf: #158 ALU64_MOD_K: 2147483647 % 2147483645 = 2 jited:1 41 PASS [ 6379.189712] test_bpf: #159 ALU_AND_X: 3 & 2 = 2 jited:1 26 PASS [ 6379.190730] test_bpf: #160 ALU_AND_X: 0xffffffff & 0xffffffff = 0xffffffff jited:1 25 PASS [ 6379.192039] test_bpf: #161 ALU64_AND_X: 3 & 2 = 2 jited:1 26 PASS [ 6379.193093] test_bpf: #162 ALU64_AND_X: 0xffffffff & 0xffffffff = 0xffffffff jited:1 26 PASS [ 6379.194438] test_bpf: #163 ALU_AND_K: 3 & 2 = 2 jited:1 26 PASS [ 6379.195475] test_bpf: #164 ALU_AND_K: 0xffffffff & 0xffffffff = 0xffffffff jited:1 34 PASS [ 6379.196944] test_bpf: #165 ALU_AND_K: Small immediate jited:1 29 PASS [ 6379.198300] test_bpf: #166 ALU_AND_K: Large immediate jited:1 25 PASS [ 6379.199410] test_bpf: #167 ALU_AND_K: Zero extension jited:1 27 PASS [ 6379.200491] test_bpf: #168 ALU64_AND_K: 3 & 2 = 2 jited:1 27 PASS [ 6379.201636] test_bpf: #169 ALU64_AND_K: 0xffffffff & 0xffffffff = 0xffffffff jited:1 25 PASS [ 6379.203017] test_bpf: #170 ALU64_AND_K: 0x0000ffffffff0000 & 0x0 = 0x0000000000000000 jited:1 27 PASS [ 6379.204466] test_bpf: #171 ALU64_AND_K: 0x0000ffffffff0000 & -1 = 0x0000ffffffff0000 jited:1 37 PASS [ 6379.205896] test_bpf: #172 ALU64_AND_K: 0xffffffffffffffff & -1 = 0xffffffffffffffff jited:1 27 PASS [ 6379.207354] test_bpf: #173 ALU64_AND_K: Sign extension 1 jited:1 27 PASS [ 6379.208474] test_bpf: #174 ALU64_AND_K: Sign extension 2 jited:1 28 PASS [ 6379.209665] test_bpf: #175 ALU_OR_X: 1 | 2 = 3 jited:1 26 PASS [ 6379.210686] test_bpf: #176 ALU_OR_X: 0x0 | 0xffffffff = 0xffffffff jited:1 27 PASS [ 6379.211909] test_bpf: #177 ALU64_OR_X: 1 | 2 = 3 jited:1 26 PASS [ 6379.212947] test_bpf: #178 ALU64_OR_X: 0 | 0xffffffff = 0xffffffff jited:1 26 PASS [ 6379.214199] test_bpf: #179 ALU_OR_K: 1 | 2 = 3 jited:1 26 PASS [ 6379.215323] test_bpf: #180 ALU_OR_K: 0 & 0xffffffff = 0xffffffff jited:1 34 PASS [ 6379.216902] test_bpf: #181 ALU_OR_K: Small immediate jited:1 27 PASS [ 6379.218058] test_bpf: #182 ALU_OR_K: Large immediate jited:1 26 PASS [ 6379.219148] test_bpf: #183 ALU_OR_K: Zero extension jited:1 27 PASS [ 6379.220358] test_bpf: #184 ALU64_OR_K: 1 | 2 = 3 jited:1 26 PASS [ 6379.221418] test_bpf: #185 ALU64_OR_K: 0 & 0xffffffff = 0xffffffff jited:1 26 PASS [ 6379.222693] test_bpf: #186 ALU64_OR_K: 0x0000ffffffff0000 | 0x0 = 0x0000ffffffff0000 jited:1 27 PASS [ 6379.224139] test_bpf: #187 ALU64_OR_K: 0x0000ffffffff0000 | -1 = 0xffffffffffffffff jited:1 28 PASS [ 6379.225594] test_bpf: #188 ALU64_OR_K: 0x000000000000000 | -1 = 0xffffffffffffffff jited:1 28 PASS [ 6379.227034] test_bpf: #189 ALU64_OR_K: Sign extension 1 jited:1 27 PASS [ 6379.228159] test_bpf: #190 ALU64_OR_K: Sign extension 2 jited:1 27 PASS [ 6379.229276] test_bpf: #191 ALU_XOR_X: 5 ^ 6 = 3 jited:1 26 PASS [ 6379.230336] test_bpf: #192 ALU_XOR_X: 0x1 ^ 0xffffffff = 0xfffffffe jited:1 27 PASS [ 6379.231613] test_bpf: #193 ALU64_XOR_X: 5 ^ 6 = 3 jited:1 26 PASS [ 6379.232659] test_bpf: #194 ALU64_XOR_X: 1 ^ 0xffffffff = 0xfffffffe jited:1 25 PASS [ 6379.234007] test_bpf: #195 ALU_XOR_K: 5 ^ 6 = 3 jited:1 28 PASS [ 6379.235156] test_bpf: #196 ALU_XOR_K: 1 ^ 0xffffffff = 0xfffffffe jited:1 29 PASS [ 6379.236427] test_bpf: #197 ALU_XOR_K: Small immediate jited:1 26 PASS [ 6379.237548] test_bpf: #198 ALU_XOR_K: Large immediate jited:1 26 PASS [ 6379.238660] test_bpf: #199 ALU_XOR_K: Zero extension jited:1 27 PASS [ 6379.239766] test_bpf: #200 ALU64_XOR_K: 5 ^ 6 = 3 jited:1 27 PASS [ 6379.240830] test_bpf: #201 ALU64_XOR_K: 1 ^ 0xffffffff = 0xfffffffe jited:1 43 PASS [ 6379.242098] test_bpf: #202 ALU64_XOR_K: 0x0000ffffffff0000 ^ 0x0 = 0x0000ffffffff0000 jited:1 28 PASS [ 6379.243603] test_bpf: #203 ALU64_XOR_K: 0x0000ffffffff0000 ^ -1 = 0xffff00000000ffff jited:1 27 PASS [ 6379.245064] test_bpf: #204 ALU64_XOR_K: 0x000000000000000 ^ -1 = 0xffffffffffffffff jited:1 28 PASS [ 6379.246504] test_bpf: #205 ALU64_XOR_K: Sign extension 1 jited:1 28 PASS [ 6379.247660] test_bpf: #206 ALU64_XOR_K: Sign extension 2 jited:1 27 PASS [ 6379.248823] test_bpf: #207 ALU_LSH_X: 1 << 1 = 2 jited:1 44 PASS [ 6379.249882] test_bpf: #208 ALU_LSH_X: 1 << 31 = 0x80000000 jited:1 27 PASS [ 6379.251063] test_bpf: #209 ALU_LSH_X: 0x12345678 << 12 = 0x45678000 jited:1 26 PASS [ 6379.252335] test_bpf: #210 ALU64_LSH_X: 1 << 1 = 2 jited:1 27 PASS [ 6379.253413] test_bpf: #211 ALU64_LSH_X: 1 << 31 = 0x80000000 jited:1 26 PASS [ 6379.254614] test_bpf: #212 ALU64_LSH_X: Shift < 32, low word jited:1 27 PASS [ 6379.255795] test_bpf: #213 ALU64_LSH_X: Shift < 32, high word jited:1 27 PASS [ 6379.257009] test_bpf: #214 ALU64_LSH_X: Shift > 32, low word jited:1 26 PASS [ 6379.258199] test_bpf: #215 ALU64_LSH_X: Shift > 32, high word jited:1 26 PASS [ 6379.259374] test_bpf: #216 ALU64_LSH_X: Shift == 32, low word jited:1 27 PASS [ 6379.260626] test_bpf: #217 ALU64_LSH_X: Shift == 32, high word jited:1 27 PASS [ 6379.261825] test_bpf: #218 ALU64_LSH_X: Zero shift, low word jited:1 26 PASS [ 6379.263017] test_bpf: #219 ALU64_LSH_X: Zero shift, high word jited:1 26 PASS [ 6379.264202] test_bpf: #220 ALU_LSH_K: 1 << 1 = 2 jited:1 26 PASS [ 6379.265248] test_bpf: #221 ALU_LSH_K: 1 << 31 = 0x80000000 jited:1 27 PASS [ 6379.266391] test_bpf: #222 ALU_LSH_K: 0x12345678 << 12 = 0x45678000 jited:1 26 PASS [ 6379.267644] test_bpf: #223 ALU_LSH_K: 0x12345678 << 0 = 0x12345678 jited:1 26 PASS [ 6379.268885] test_bpf: #224 ALU64_LSH_K: 1 << 1 = 2 jited:1 26 PASS [ 6379.269948] test_bpf: #225 ALU64_LSH_K: 1 << 31 = 0x80000000 jited:1 27 PASS [ 6379.271143] test_bpf: #226 ALU64_LSH_K: Shift < 32, low word jited:1 26 PASS [ 6379.273502] test_bpf: #227 ALU64_LSH_K: Shift < 32, high word jited:1 26 PASS [ 6379.274711] test_bpf: #228 ALU64_LSH_K: Shift > 32, low word jited:1 26 PASS [ 6379.275889] test_bpf: #229 ALU64_LSH_K: Shift > 32, high word jited:1 25 PASS [ 6379.277113] test_bpf: #230 ALU64_LSH_K: Shift == 32, low word jited:1 26 PASS [ 6379.278324] test_bpf: #231 ALU64_LSH_K: Shift == 32, high word jited:1 26 PASS [ 6379.279517] test_bpf: #232 ALU64_LSH_K: Zero shift jited:1 26 PASS [ 6379.280581] test_bpf: #233 ALU_RSH_X: 2 >> 1 = 1 jited:1 27 PASS [ 6379.281643] test_bpf: #234 ALU_RSH_X: 0x80000000 >> 31 = 1 jited:1 26 PASS [ 6379.282786] test_bpf: #235 ALU_RSH_X: 0x12345678 >> 20 = 0x123 jited:1 27 PASS [ 6379.283997] test_bpf: #236 ALU64_RSH_X: 2 >> 1 = 1 jited:1 26 PASS [ 6379.285075] test_bpf: #237 ALU64_RSH_X: 0x80000000 >> 31 = 1 jited:1 27 PASS [ 6379.286270] test_bpf: #238 ALU64_RSH_X: Shift < 32, low word jited:1 26 PASS [ 6379.287449] test_bpf: #239 ALU64_RSH_X: Shift < 32, high word jited:1 35 PASS [ 6379.288667] test_bpf: #240 ALU64_RSH_X: Shift > 32, low word jited:1 27 PASS [ 6379.289864] test_bpf: #241 ALU64_RSH_X: Shift > 32, high word jited:1 26 PASS [ 6379.291083] test_bpf: #242 ALU64_RSH_X: Shift == 32, low word jited:1 27 PASS [ 6379.292271] test_bpf: #243 ALU64_RSH_X: Shift == 32, high word jited:1 27 PASS [ 6379.293529] test_bpf: #244 ALU64_RSH_X: Zero shift, low word jited:1 26 PASS [ 6379.294729] test_bpf: #245 ALU64_RSH_X: Zero shift, high word jited:1 27 PASS [ 6379.295925] test_bpf: #246 ALU_RSH_K: 2 >> 1 = 1 jited:1 25 PASS [ 6379.297003] test_bpf: #247 ALU_RSH_K: 0x80000000 >> 31 = 1 jited:1 26 PASS [ 6379.298162] test_bpf: #248 ALU_RSH_K: 0x12345678 >> 20 = 0x123 jited:1 25 PASS [ 6379.299358] test_bpf: #249 ALU_RSH_K: 0x12345678 >> 0 = 0x12345678 jited:1 26 PASS [ 6379.300611] test_bpf: #250 ALU64_RSH_K: 2 >> 1 = 1 jited:1 26 PASS [ 6379.301665] test_bpf: #251 ALU64_RSH_K: 0x80000000 >> 31 = 1 jited:1 25 PASS [ 6379.302842] test_bpf: #252 ALU64_RSH_K: Shift < 32, low word jited:1 42 PASS [ 6379.304023] test_bpf: #253 ALU64_RSH_K: Shift < 32, high word jited:1 26 PASS [ 6379.305211] test_bpf: #254 ALU64_RSH_K: Shift > 32, low word jited:1 26 PASS [ 6379.306379] test_bpf: #255 ALU64_RSH_K: Shift > 32, high word jited:1 26 PASS [ 6379.307563] test_bpf: #256 ALU64_RSH_K: Shift == 32, low word jited:1 25 PASS [ 6379.308743] test_bpf: #257 ALU64_RSH_K: Shift == 32, high word jited:1 25 PASS [ 6379.309941] test_bpf: #258 ALU64_RSH_K: Zero shift jited:1 26 PASS [ 6379.311063] test_bpf: #259 ALU32_ARSH_X: -1234 >> 7 = -10 jited:1 26 PASS [ 6379.312218] test_bpf: #260 ALU64_ARSH_X: 0xff00ff0000000000 >> 40 = 0xffffffffffff00ff jited:1 25 PASS [ 6379.313680] test_bpf: #261 ALU64_ARSH_X: Shift < 32, low word jited:1 26 PASS [ 6379.314860] test_bpf: #262 ALU64_ARSH_X: Shift < 32, high word jited:1 27 PASS [ 6379.316217] test_bpf: #263 ALU64_ARSH_X: Shift > 32, low word jited:1 27 PASS [ 6379.317442] test_bpf: #264 ALU64_ARSH_X: Shift > 32, high word jited:1 33 PASS [ 6379.318654] test_bpf: #265 ALU64_ARSH_X: Shift == 32, low word jited:1 27 PASS [ 6379.319976] test_bpf: #266 ALU64_ARSH_X: Shift == 32, high word jited:1 27 PASS [ 6379.321232] test_bpf: #267 ALU64_ARSH_X: Zero shift, low word jited:1 27 PASS [ 6379.322424] test_bpf: #268 ALU64_ARSH_X: Zero shift, high word jited:1 27 PASS [ 6379.323626] test_bpf: #269 ALU32_ARSH_K: -1234 >> 7 = -10 jited:1 25 PASS [ 6379.324771] test_bpf: #270 ALU32_ARSH_K: -1234 >> 0 = -1234 jited:1 25 PASS [ 6379.325919] test_bpf: #271 ALU64_ARSH_K: 0xff00ff0000000000 >> 40 = 0xffffffffffff00ff jited:1 25 PASS [ 6379.327387] test_bpf: #272 ALU64_ARSH_K: Shift < 32, low word jited:1 26 PASS [ 6379.328565] test_bpf: #273 ALU64_ARSH_K: Shift < 32, high word jited:1 26 PASS [ 6379.329772] test_bpf: #274 ALU64_ARSH_K: Shift > 32, low word jited:1 26 PASS [ 6379.330977] test_bpf: #275 ALU64_ARSH_K: Shift > 32, high word jited:1 25 PASS [ 6379.332188] test_bpf: #276 ALU64_ARSH_K: Shift == 32, low word jited:1 26 PASS [ 6379.333382] test_bpf: #277 ALU64_ARSH_K: Shift == 32, high word jited:1 26 PASS [ 6379.334592] test_bpf: #278 ALU64_ARSH_K: Zero shift jited:1 26 PASS [ 6379.335671] test_bpf: #279 ALU_NEG: -(3) = -3 jited:1 26 PASS [ 6379.336696] test_bpf: #280 ALU_NEG: -(-3) = 3 jited:1 26 PASS [ 6379.337712] test_bpf: #281 ALU64_NEG: -(3) = -3 jited:1 25 PASS [ 6379.338753] test_bpf: #282 ALU64_NEG: -(-3) = 3 jited:1 26 PASS [ 6379.339785] test_bpf: #283 ALU_END_FROM_BE 16: 0x0123456789abcdef -> 0xcdef jited:1 26 PASS [ 6379.341134] test_bpf: #284 ALU_END_FROM_BE 32: 0x0123456789abcdef -> 0x89abcdef jited:1 26 PASS [ 6379.342659] test_bpf: #285 ALU_END_FROM_BE 64: 0x0123456789abcdef -> 0x89abcdef jited:1 26 PASS [ 6379.344117] test_bpf: #286 ALU_END_FROM_BE 64: 0x0123456789abcdef >> 32 -> 0x01234567 jited:1 26 PASS [ 6379.345586] test_bpf: #287 ALU_END_FROM_BE 16: 0xfedcba9876543210 -> 0x3210 jited:1 26 PASS [ 6379.346935] test_bpf: #288 ALU_END_FROM_BE 32: 0xfedcba9876543210 -> 0x76543210 jited:1 27 PASS [ 6379.348343] test_bpf: #289 ALU_END_FROM_BE 64: 0xfedcba9876543210 -> 0x76543210 jited:1 26 PASS [ 6379.349757] test_bpf: #290 ALU_END_FROM_BE 64: 0xfedcba9876543210 >> 32 -> 0xfedcba98 jited:1 26 PASS [ 6379.351214] test_bpf: #291 ALU_END_FROM_LE 16: 0x0123456789abcdef -> 0xefcd jited:1 26 PASS [ 6379.352558] test_bpf: #292 ALU_END_FROM_LE 32: 0x0123456789abcdef -> 0xefcdab89 jited:1 27 PASS [ 6379.354037] test_bpf: #293 ALU_END_FROM_LE 64: 0x0123456789abcdef -> 0x67452301 jited:1 26 PASS [ 6379.355456] test_bpf: #294 ALU_END_FROM_LE 64: 0x0123456789abcdef >> 32 -> 0xefcdab89 jited:1 33 PASS [ 6379.356920] test_bpf: #295 ALU_END_FROM_LE 16: 0xfedcba9876543210 -> 0x1032 jited:1 26 PASS [ 6379.358286] test_bpf: #296 ALU_END_FROM_LE 32: 0xfedcba9876543210 -> 0x10325476 jited:1 26 PASS [ 6379.359689] test_bpf: #297 ALU_END_FROM_LE 64: 0xfedcba9876543210 -> 0x10325476 jited:1 26 PASS [ 6379.361095] test_bpf: #298 ALU_END_FROM_LE 64: 0xfedcba9876543210 >> 32 -> 0x98badcfe jited:1 26 PASS [ 6379.362725] test_bpf: #299 BPF_LDX_MEM | BPF_B, base jited:1 27 PASS [ 6379.363850] test_bpf: #300 BPF_LDX_MEM | BPF_B, MSB set jited:1 27 PASS [ 6379.365012] test_bpf: #301 BPF_LDX_MEM | BPF_B, negative offset jited:1 27 PASS [ 6379.366229] test_bpf: #302 BPF_LDX_MEM | BPF_B, small positive offset jited:1 27 PASS [ 6379.367504] test_bpf: #303 BPF_LDX_MEM | BPF_B, large positive offset jited:1 27 PASS [ 6379.368788] test_bpf: #304 BPF_LDX_MEM | BPF_H, base jited:1 27 PASS [ 6379.369871] test_bpf: #305 BPF_LDX_MEM | BPF_H, MSB set jited:1 27 PASS [ 6379.371005] test_bpf: #306 BPF_LDX_MEM | BPF_H, negative offset jited:1 27 PASS [ 6379.372208] test_bpf: #307 BPF_LDX_MEM | BPF_H, small positive offset jited:1 27 PASS [ 6379.373468] test_bpf: #308 BPF_LDX_MEM | BPF_H, large positive offset jited:1 34 PASS [ 6379.374746] test_bpf: #309 BPF_LDX_MEM | BPF_H, unaligned positive offset jited:1 27 PASS [ 6379.376060] test_bpf: #310 BPF_LDX_MEM | BPF_W, base jited:1 27 PASS [ 6379.377162] test_bpf: #311 BPF_LDX_MEM | BPF_W, MSB set jited:1 27 PASS [ 6379.378277] test_bpf: #312 BPF_LDX_MEM | BPF_W, negative offset jited:1 26 PASS [ 6379.379477] test_bpf: #313 BPF_LDX_MEM | BPF_W, small positive offset jited:1 27 PASS [ 6379.380741] test_bpf: #314 BPF_LDX_MEM | BPF_W, large positive offset jited:1 27 PASS [ 6379.382036] test_bpf: #315 BPF_LDX_MEM | BPF_W, unaligned positive offset jited:1 27 PASS [ 6379.383352] test_bpf: #316 BPF_LDX_MEM | BPF_DW, base jited:1 27 PASS [ 6379.384450] test_bpf: #317 BPF_LDX_MEM | BPF_DW, MSB set jited:1 35 PASS [ 6379.385585] test_bpf: #318 BPF_LDX_MEM | BPF_DW, negative offset jited:1 27 PASS [ 6379.386804] test_bpf: #319 BPF_LDX_MEM | BPF_DW, small positive offset jited:1 27 PASS [ 6379.388091] test_bpf: #320 BPF_LDX_MEM | BPF_DW, large positive offset jited:1 27 PASS [ 6379.389379] test_bpf: #321 BPF_LDX_MEM | BPF_DW, unaligned positive offset jited:1 27 PASS [ 6379.390702] test_bpf: #322 BPF_STX_MEM | BPF_B jited:1 28 PASS [ 6379.391719] test_bpf: #323 BPF_STX_MEM | BPF_B, MSB set jited:1 28 PASS [ 6379.392841] test_bpf: #324 BPF_STX_MEM | BPF_H jited:1 27 PASS [ 6379.393866] test_bpf: #325 BPF_STX_MEM | BPF_H, MSB set jited:1 27 PASS [ 6379.395012] test_bpf: #326 BPF_STX_MEM | BPF_W jited:1 27 PASS [ 6379.396058] test_bpf: #327 BPF_STX_MEM | BPF_W, MSB set jited:1 27 PASS [ 6379.397190] test_bpf: #328 ST_MEM_B: Store/Load byte: max negative jited:1 26 PASS [ 6379.398434] test_bpf: #329 ST_MEM_B: Store/Load byte: max positive jited:1 27 PASS [ 6379.399679] test_bpf: #330 STX_MEM_B: Store/Load byte: max negative jited:1 26 PASS [ 6379.400922] test_bpf: #331 ST_MEM_H: Store/Load half word: max negative jited:1 27 PASS [ 6379.402232] test_bpf: #332 ST_MEM_H: Store/Load half word: max positive jited:1 27 PASS [ 6379.403535] test_bpf: #333 STX_MEM_H: Store/Load half word: max negative jited:1 26 PASS [ 6379.404835] test_bpf: #334 ST_MEM_W: Store/Load word: max negative jited:1 48 PASS [ 6379.406088] test_bpf: #335 ST_MEM_W: Store/Load word: max positive jited:1 25 PASS [ 6379.407326] test_bpf: #336 STX_MEM_W: Store/Load word: max negative jited:1 26 PASS [ 6379.408574] test_bpf: #337 ST_MEM_DW: Store/Load double word: max negative jited:1 27 PASS [ 6379.409905] test_bpf: #338 ST_MEM_DW: Store/Load double word: max negative 2 jited:1 29 PASS [ 6379.411291] test_bpf: #339 ST_MEM_DW: Store/Load double word: max positive jited:1 26 PASS [ 6379.412668] test_bpf: #340 STX_MEM_DW: Store/Load double word: max negative jited:1 26 PASS [ 6379.414024] test_bpf: #341 STX_MEM_DW: Store double word: first word in memory jited:1 26 PASS [ 6379.415414] test_bpf: #342 STX_MEM_DW: Store double word: second word in memory jited:1 26 PASS [ 6379.416826] test_bpf: #343 STX_XADD_W: X + 1 + 1 + 1 + ... jited:1 33393 PASS [ 6379.453290] test_bpf: #344 STX_XADD_DW: X + 1 + 1 + 1 + ... jited:1 37474 PASS [ 6379.500344] test_bpf: #345 BPF_ATOMIC | BPF_W, BPF_ADD: Test: 0x12 + 0xab = 0xbd jited:1 32 PASS [ 6379.503417] test_bpf: #346 BPF_ATOMIC | BPF_W, BPF_ADD: Test side effects, r10: 0x12 + 0xab = 0xbd jited:1 32 PASS [ 6379.505189] test_bpf: #347 BPF_ATOMIC | BPF_W, BPF_ADD: Test side effects, r0: 0x12 + 0xab = 0xbd jited:1 37 PASS [ 6379.506964] test_bpf: #348 BPF_ATOMIC | BPF_W, BPF_ADD: Test fetch: 0x12 + 0xab = 0xbd jited:1 38 PASS [ 6379.508592] test_bpf: #349 BPF_ATOMIC | BPF_W, BPF_ADD | BPF_FETCH: Test: 0x12 + 0xab = 0xbd jited:1 32 PASS [ 6379.510330] test_bpf: #350 BPF_ATOMIC | BPF_W, BPF_ADD | BPF_FETCH: Test side effects, r10: 0x12 + 0xab = 0xbd jited:1 30 PASS [ 6379.512217] test_bpf: #351 BPF_ATOMIC | BPF_W, BPF_ADD | BPF_FETCH: Test side effects, r0: 0x12 + 0xab = 0xbd jited:1 31 PASS [ 6379.514211] test_bpf: #352 BPF_ATOMIC | BPF_W, BPF_ADD | BPF_FETCH: Test fetch: 0x12 + 0xab = 0xbd jited:1 31 PASS [ 6379.515932] test_bpf: #353 BPF_ATOMIC | BPF_DW, BPF_ADD: Test: 0x12 + 0xab = 0xbd jited:1 32 PASS [ 6379.517519] test_bpf: #354 BPF_ATOMIC | BPF_DW, BPF_ADD: Test side effects, r10: 0x12 + 0xab = 0xbd jited:1 32 PASS [ 6379.519348] test_bpf: #355 BPF_ATOMIC | BPF_DW, BPF_ADD: Test side effects, r0: 0x12 + 0xab = 0xbd jited:1 37 PASS [ 6379.521590] test_bpf: #356 BPF_ATOMIC | BPF_DW, BPF_ADD: Test fetch: 0x12 + 0xab = 0xbd jited:1 31 PASS [ 6379.523157] test_bpf: #357 BPF_ATOMIC | BPF_DW, BPF_ADD | BPF_FETCH: Test: 0x12 + 0xab = 0xbd jited:1 32 PASS [ 6379.524738] test_bpf: #358 BPF_ATOMIC | BPF_DW, BPF_ADD | BPF_FETCH: Test side effects, r10: 0x12 + 0xab = 0xbd jited:1 31 PASS [ 6379.526538] test_bpf: #359 BPF_ATOMIC | BPF_DW, BPF_ADD | BPF_FETCH: Test side effects, r0: 0x12 + 0xab = 0xbd jited:1 31 PASS [ 6379.528291] test_bpf: #360 BPF_ATOMIC | BPF_DW, BPF_ADD | BPF_FETCH: Test fetch: 0x12 + 0xab = 0xbd jited:1 31 PASS [ 6379.529922] test_bpf: #361 BPF_ATOMIC | BPF_W, BPF_AND: Test: 0x12 & 0xab = 0x02 jited:1 32 PASS [ 6379.531348] test_bpf: #362 BPF_ATOMIC | BPF_W, BPF_AND: Test side effects, r10: 0x12 & 0xab = 0x02 jited:1 31 PASS [ 6379.532968] test_bpf: #363 BPF_ATOMIC | BPF_W, BPF_AND: Test side effects, r0: 0x12 & 0xab = 0x02 jited:1 32 PASS [ 6379.534580] test_bpf: #364 BPF_ATOMIC | BPF_W, BPF_AND: Test fetch: 0x12 & 0xab = 0x02 jited:1 31 PASS [ 6379.536052] test_bpf: #365 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test: 0x12 & 0xab = 0x02 jited:1 34 PASS [ 6379.537619] test_bpf: #366 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test side effects, r10: 0x12 & 0xab = 0x02 jited:1 34 PASS [ 6379.539520] test_bpf: #367 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test side effects, r0: 0x12 & 0xab = 0x02 jited:1 34 PASS [ 6379.541301] test_bpf: #368 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test fetch: 0x12 & 0xab = 0x02 jited:1 88 PASS [ 6379.543001] test_bpf: #369 BPF_ATOMIC | BPF_DW, BPF_AND: Test: 0x12 & 0xab = 0x02 jited:1 32 PASS [ 6379.544429] test_bpf: #370 BPF_ATOMIC | BPF_DW, BPF_AND: Test side effects, r10: 0x12 & 0xab = 0x02 jited:1 39 PASS [ 6379.546058] test_bpf: #371 BPF_ATOMIC | BPF_DW, BPF_AND: Test side effects, r0: 0x12 & 0xab = 0x02 jited:1 31 PASS [ 6379.547701] test_bpf: #372 BPF_ATOMIC | BPF_DW, BPF_AND: Test fetch: 0x12 & 0xab = 0x02 jited:1 31 PASS [ 6379.549182] test_bpf: #373 BPF_ATOMIC | BPF_DW, BPF_AND | BPF_FETCH: Test: 0x12 & 0xab = 0x02 jited:1 34 PASS [ 6379.550751] test_bpf: #374 BPF_ATOMIC | BPF_DW, BPF_AND | BPF_FETCH: Test side effects, r10: 0x12 & 0xab = 0x02 jited:1 36 PASS [ 6379.552580] test_bpf: #375 BPF_ATOMIC | BPF_DW, BPF_AND | BPF_FETCH: Test side effects, r0: 0x12 & 0xab = 0x02 jited:1 35 PASS [ 6379.554325] test_bpf: #376 BPF_ATOMIC | BPF_DW, BPF_AND | BPF_FETCH: Test fetch: 0x12 & 0xab = 0x02 jited:1 34 PASS [ 6379.556054] test_bpf: #377 BPF_ATOMIC | BPF_W, BPF_OR: Test: 0x12 | 0xab = 0xbb jited:1 32 PASS [ 6379.557474] test_bpf: #378 BPF_ATOMIC | BPF_W, BPF_OR: Test side effects, r10: 0x12 | 0xab = 0xbb jited:1 31 PASS [ 6379.559090] test_bpf: #379 BPF_ATOMIC | BPF_W, BPF_OR: Test side effects, r0: 0x12 | 0xab = 0xbb jited:1 31 PASS [ 6379.560704] test_bpf: #380 BPF_ATOMIC | BPF_W, BPF_OR: Test fetch: 0x12 | 0xab = 0xbb jited:1 31 PASS [ 6379.562164] test_bpf: #381 BPF_ATOMIC | BPF_W, BPF_OR | BPF_FETCH: Test: 0x12 | 0xab = 0xbb jited:1 34 PASS [ 6379.563765] test_bpf: #382 BPF_ATOMIC | BPF_W, BPF_OR | BPF_FETCH: Test side effects, r10: 0x12 | 0xab = 0xbb jited:1 34 PASS [ 6379.565578] test_bpf: #383 BPF_ATOMIC | BPF_W, BPF_OR | BPF_FETCH: Test side effects, r0: 0x12 | 0xab = 0xbb jited:1 34 PASS [ 6379.567365] test_bpf: #384 BPF_ATOMIC | BPF_W, BPF_OR | BPF_FETCH: Test fetch: 0x12 | 0xab = 0xbb jited:1 34 PASS [ 6379.568997] test_bpf: #385 BPF_ATOMIC | BPF_DW, BPF_OR: Test: 0x12 | 0xab = 0xbb jited:1 32 PASS [ 6379.570416] test_bpf: #386 BPF_ATOMIC | BPF_DW, BPF_OR: Test side effects, r10: 0x12 | 0xab = 0xbb jited:1 40 PASS [ 6379.572103] test_bpf: #387 BPF_ATOMIC | BPF_DW, BPF_OR: Test side effects, r0: 0x12 | 0xab = 0xbb jited:1 32 PASS [ 6379.573876] test_bpf: #388 BPF_ATOMIC | BPF_DW, BPF_OR: Test fetch: 0x12 | 0xab = 0xbb jited:1 31 PASS [ 6379.575393] test_bpf: #389 BPF_ATOMIC | BPF_DW, BPF_OR | BPF_FETCH: Test: 0x12 | 0xab = 0xbb jited:1 34 PASS [ 6379.576985] test_bpf: #390 BPF_ATOMIC | BPF_DW, BPF_OR | BPF_FETCH: Test side effects, r10: 0x12 | 0xab = 0xbb jited:1 36 PASS [ 6379.578787] test_bpf: #391 BPF_ATOMIC | BPF_DW, BPF_OR | BPF_FETCH: Test side effects, r0: 0x12 | 0xab = 0xbb jited:1 57 PASS [ 6379.580583] test_bpf: #392 BPF_ATOMIC | BPF_DW, BPF_OR | BPF_FETCH: Test fetch: 0x12 | 0xab = 0xbb jited:1 34 PASS [ 6379.582217] test_bpf: #393 BPF_ATOMIC | BPF_W, BPF_XOR: Test: 0x12 ^ 0xab = 0xb9 jited:1 33 PASS [ 6379.583660] test_bpf: #394 BPF_ATOMIC | BPF_W, BPF_XOR: Test side effects, r10: 0x12 ^ 0xab = 0xb9 jited:1 31 PASS [ 6379.585303] test_bpf: #395 BPF_ATOMIC | BPF_W, BPF_XOR: Test side effects, r0: 0x12 ^ 0xab = 0xb9 jited:1 32 PASS [ 6379.586918] test_bpf: #396 BPF_ATOMIC | BPF_W, BPF_XOR: Test fetch: 0x12 ^ 0xab = 0xb9 jited:1 31 PASS [ 6379.588417] test_bpf: #397 BPF_ATOMIC | BPF_W, BPF_XOR | BPF_FETCH: Test: 0x12 ^ 0xab = 0xb9 jited:1 41 PASS [ 6379.589993] test_bpf: #398 BPF_ATOMIC | BPF_W, BPF_XOR | BPF_FETCH: Test side effects, r10: 0x12 ^ 0xab = 0xb9 jited:1 35 PASS [ 6379.591749] test_bpf: #399 BPF_ATOMIC | BPF_W, BPF_XOR | BPF_FETCH: Test side effects, r0: 0x12 ^ 0xab = 0xb9 jited:1 34 PASS [ 6379.593628] test_bpf: #400 BPF_ATOMIC | BPF_W, BPF_XOR | BPF_FETCH: Test fetch: 0x12 ^ 0xab = 0xb9 jited:1 34 PASS [ 6379.595278] test_bpf: #401 BPF_ATOMIC | BPF_DW, BPF_XOR: Test: 0x12 ^ 0xab = 0xb9 jited:1 32 PASS [ 6379.596710] test_bpf: #402 BPF_ATOMIC | BPF_DW, BPF_XOR: Test side effects, r10: 0x12 ^ 0xab = 0xb9 jited:1 31 PASS [ 6379.598362] test_bpf: #403 BPF_ATOMIC | BPF_DW, BPF_XOR: Test side effects, r0: 0x12 ^ 0xab = 0xb9 jited:1 31 PASS [ 6379.599993] test_bpf: #404 BPF_ATOMIC | BPF_DW, BPF_XOR: Test fetch: 0x12 ^ 0xab = 0xb9 jited:1 31 PASS [ 6379.601467] test_bpf: #405 BPF_ATOMIC | BPF_DW, BPF_XOR | BPF_FETCH: Test: 0x12 ^ 0xab = 0xb9 jited:1 35 PASS [ 6379.603051] test_bpf: #406 BPF_ATOMIC | BPF_DW, BPF_XOR | BPF_FETCH: Test side effects, r10: 0x12 ^ 0xab = 0xb9 jited:1 37 PASS [ 6379.604853] test_bpf: #407 BPF_ATOMIC | BPF_DW, BPF_XOR | BPF_FETCH: Test side effects, r0: 0x12 ^ 0xab = 0xb9 jited:1 34 PASS [ 6379.606631] test_bpf: #408 BPF_ATOMIC | BPF_DW, BPF_XOR | BPF_FETCH: Test fetch: 0x12 ^ 0xab = 0xb9 jited:1 35 PASS [ 6379.608563] test_bpf: #409 BPF_ATOMIC | BPF_W, BPF_XCHG: Test: 0x12 xchg 0xab = 0xab jited:1 32 PASS [ 6379.611558] test_bpf: #410 BPF_ATOMIC | BPF_W, BPF_XCHG: Test side effects, r10: 0x12 xchg 0xab = 0xab jited:1 32 PASS [ 6379.613394] test_bpf: #411 BPF_ATOMIC | BPF_W, BPF_XCHG: Test side effects, r0: 0x12 xchg 0xab = 0xab jited:1 43 PASS [ 6379.615468] test_bpf: #412 BPF_ATOMIC | BPF_W, BPF_XCHG: Test fetch: 0x12 xchg 0xab = 0xab jited:1 39 PASS [ 6379.617413] test_bpf: #413 BPF_ATOMIC | BPF_DW, BPF_XCHG: Test: 0x12 xchg 0xab = 0xab jited:1 45 PASS [ 6379.619300] test_bpf: #414 BPF_ATOMIC | BPF_DW, BPF_XCHG: Test side effects, r10: 0x12 xchg 0xab = 0xab jited:1 31 PASS [ 6379.621128] test_bpf: #415 BPF_ATOMIC | BPF_DW, BPF_XCHG: Test side effects, r0: 0x12 xchg 0xab = 0xab jited:1 32 PASS [ 6379.622958] test_bpf: #416 BPF_ATOMIC | BPF_DW, BPF_XCHG: Test fetch: 0x12 xchg 0xab = 0xab jited:1 35 PASS [ 6379.624768] test_bpf: #417 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test successful return jited:1 31 PASS [ 6379.626391] test_bpf: #418 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test successful store jited:1 41 PASS [ 6379.628003] test_bpf: #419 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test failure return jited:1 31 PASS [ 6379.629644] test_bpf: #420 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test failure store jited:1 31 PASS [ 6379.632238] test_bpf: #421 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test side effects jited:1 38 PASS [ 6379.633699] test_bpf: #422 BPF_ATOMIC | BPF_DW, BPF_CMPXCHG: Test successful return jited:1 31 PASS [ 6379.635332] test_bpf: #423 BPF_ATOMIC | BPF_DW, BPF_CMPXCHG: Test successful store jited:1 32 PASS [ 6379.636834] test_bpf: #424 BPF_ATOMIC | BPF_DW, BPF_CMPXCHG: Test failure return jited:1 31 PASS [ 6379.638412] test_bpf: #425 BPF_ATOMIC | BPF_DW, BPF_CMPXCHG: Test failure store jited:1 32 PASS [ 6379.639953] test_bpf: #426 BPF_ATOMIC | BPF_DW, BPF_CMPXCHG: Test side effects jited:1 38 PASS [ 6379.641475] test_bpf: #427 JMP32_JEQ_K: Small immediate jited:1 31 PASS [ 6379.642728] test_bpf: #428 JMP32_JEQ_K: Large immediate jited:1 27 PASS [ 6379.643958] test_bpf: #429 JMP32_JEQ_K: negative immediate jited:1 27 PASS [ 6379.645231] test_bpf: #430 JMP32_JEQ_X jited:1 27 PASS [ 6379.646281] test_bpf: #431 JMP32_JNE_K: Small immediate jited:1 27 PASS [ 6379.647519] test_bpf: #432 JMP32_JNE_K: Large immediate jited:1 26 PASS [ 6379.648854] test_bpf: #433 JMP32_JNE_K: negative immediate jited:1 27 PASS [ 6379.650147] test_bpf: #434 JMP32_JNE_X jited:1 27 PASS [ 6379.651181] test_bpf: #435 JMP32_JSET_K: Small immediate jited:1 27 PASS [ 6379.652429] test_bpf: #436 JMP32_JSET_K: Large immediate jited:1 27 PASS [ 6379.653670] test_bpf: #437 JMP32_JSET_K: negative immediate jited:1 26 PASS [ 6379.655054] test_bpf: #438 JMP32_JSET_X jited:1 28 PASS [ 6379.656109] test_bpf: #439 JMP32_JGT_K: Small immediate jited:1 27 PASS [ 6379.657332] test_bpf: #440 JMP32_JGT_K: Large immediate jited:1 27 PASS [ 6379.658580] test_bpf: #441 JMP32_JGT_X jited:1 27 PASS [ 6379.659626] test_bpf: #442 JMP32_JGE_K: Small immediate jited:1 27 PASS [ 6379.660865] test_bpf: #443 JMP32_JGE_K: Large immediate jited:1 27 PASS [ 6379.662153] test_bpf: #444 JMP32_JGE_X jited:1 27 PASS [ 6379.663191] test_bpf: #445 JMP32_JLT_K: Small immediate jited:1 27 PASS [ 6379.664431] test_bpf: #446 JMP32_JLT_K: Large immediate jited:1 26 PASS [ 6379.665646] test_bpf: #447 JMP32_JLT_X jited:1 28 PASS [ 6379.666686] test_bpf: #448 JMP32_JLE_K: Small immediate jited:1 27 PASS [ 6379.667896] test_bpf: #449 JMP32_JLE_K: Large immediate jited:1 34 PASS [ 6379.669158] test_bpf: #450 JMP32_JLE_X jited:1 34 PASS [ 6379.670202] test_bpf: #451 JMP32_JSGT_K: Small immediate jited:1 31 PASS [ 6379.671562] test_bpf: #452 JMP32_JSGT_K: Large immediate jited:1 26 PASS [ 6379.672767] test_bpf: #453 JMP32_JSGT_X jited:1 33 PASS [ 6379.673808] test_bpf: #454 JMP32_JSGE_K: Small immediate jited:1 32 PASS [ 6379.675147] test_bpf: #455 JMP32_JSGE_K: Large immediate jited:1 26 PASS [ 6379.676350] test_bpf: #456 JMP32_JSGE_X jited:1 27 PASS [ 6379.677404] test_bpf: #457 JMP32_JSLT_K: Small immediate jited:1 26 PASS [ 6379.678775] test_bpf: #458 JMP32_JSLT_K: Large immediate jited:1 60 PASS [ 6379.680103] test_bpf: #459 JMP32_JSLT_X jited:1 27 PASS [ 6379.681109] test_bpf: #460 JMP32_JSLE_K: Small immediate jited:1 29 PASS [ 6379.682373] test_bpf: #461 JMP32_JSLE_K: Large immediate jited:1 36 PASS [ 6379.683625] test_bpf: #462 JMP32_JSLE_X jited:1 27 PASS [ 6379.684677] test_bpf: #463 JMP_EXIT jited:1 26 PASS [ 6379.685872] test_bpf: #464 JMP_JA: Unconditional jump: if (true) return 1 jited:1 27 PASS [ 6379.687328] test_bpf: #465 JMP_JSLT_K: Signed jump: if (-2 < -1) return 1 jited:1 27 PASS [ 6379.688771] test_bpf: #466 JMP_JSLT_K: Signed jump: if (-1 < -1) return 0 jited:1 33 PASS [ 6379.690245] test_bpf: #467 JMP_JSGT_K: Signed jump: if (-1 > -2) return 1 jited:1 27 PASS [ 6379.691679] test_bpf: #468 JMP_JSGT_K: Signed jump: if (-1 > -1) return 0 jited:1 26 PASS [ 6379.693333] test_bpf: #469 JMP_JSLE_K: Signed jump: if (-2 <= -1) return 1 jited:1 33 PASS [ 6379.695162] test_bpf: #470 JMP_JSLE_K: Signed jump: if (-1 <= -1) return 1 jited:1 28 PASS [ 6379.697030] test_bpf: #471 JMP_JSLE_K: Signed jump: value walk 1 jited:1 28 PASS [ 6379.698651] test_bpf: #472 JMP_JSLE_K: Signed jump: value walk 2 jited:1 28 PASS [ 6379.700047] test_bpf: #473 JMP_JSGE_K: Signed jump: if (-1 >= -2) return 1 jited:1 31 PASS [ 6379.701516] test_bpf: #474 JMP_JSGE_K: Signed jump: if (-1 >= -1) return 1 jited:1 29 PASS [ 6379.703108] test_bpf: #475 JMP_JSGE_K: Signed jump: value walk 1 jited:1 28 PASS [ 6379.704419] test_bpf: #476 JMP_JSGE_K: Signed jump: value walk 2 jited:1 29 PASS [ 6379.705839] test_bpf: #477 JMP_JGT_K: if (3 > 2) return 1 jited:1 27 PASS [ 6379.707329] test_bpf: #478 JMP_JGT_K: Unsigned jump: if (-1 > 1) return 1 jited:1 28 PASS [ 6379.708731] test_bpf: #479 JMP_JLT_K: if (2 < 3) return 1 jited:1 27 PASS [ 6379.710068] test_bpf: #480 JMP_JGT_K: Unsigned jump: if (1 < -1) return 1 jited:1 27 PASS [ 6379.711473] test_bpf: #481 JMP_JGE_K: if (3 >= 2) return 1 jited:1 34 PASS [ 6379.712772] test_bpf: #482 JMP_JLE_K: if (2 <= 3) return 1 jited:1 34 PASS [ 6379.714086] test_bpf: #483 JMP_JGT_K: if (3 > 2) return 1 (jump backwards) jited:1 27 PASS [ 6379.715513] test_bpf: #484 JMP_JGE_K: if (3 >= 3) return 1 jited:1 32 PASS [ 6379.716803] test_bpf: #485 JMP_JGT_K: if (2 < 3) return 1 (jump backwards) jited:1 28 PASS [ 6379.718304] test_bpf: #486 JMP_JLE_K: if (3 <= 3) return 1 jited:1 27 PASS [ 6379.719580] test_bpf: #487 JMP_JNE_K: if (3 != 2) return 1 jited:1 27 PASS [ 6379.720861] test_bpf: #488 JMP_JEQ_K: if (3 == 3) return 1 jited:1 27 PASS [ 6379.722167] test_bpf: #489 JMP_JSET_K: if (0x3 & 0x2) return 1 jited:1 27 PASS [ 6379.723471] test_bpf: #490 JMP_JSET_K: if (0x3 & 0xffffffff) return 1 jited:1 27 PASS [ 6379.724901] test_bpf: #491 JMP_JSGT_X: Signed jump: if (-1 > -2) return 1 jited:1 28 PASS [ 6379.726378] test_bpf: #492 JMP_JSGT_X: Signed jump: if (-1 > -1) return 0 jited:1 36 PASS [ 6379.727812] test_bpf: #493 JMP_JSLT_X: Signed jump: if (-2 < -1) return 1 jited:1 34 PASS [ 6379.729285] test_bpf: #494 JMP_JSLT_X: Signed jump: if (-1 < -1) return 0 jited:1 27 PASS [ 6379.730734] test_bpf: #495 JMP_JSGE_X: Signed jump: if (-1 >= -2) return 1 jited:1 29 PASS [ 6379.732220] test_bpf: #496 JMP_JSGE_X: Signed jump: if (-1 >= -1) return 1 jited:1 27 PASS [ 6379.733667] test_bpf: #497 JMP_JSLE_X: Signed jump: if (-2 <= -1) return 1 jited:1 30 PASS [ 6379.735127] test_bpf: #498 JMP_JSLE_X: Signed jump: if (-1 <= -1) return 1 jited:1 27 PASS [ 6379.736585] test_bpf: #499 JMP_JGT_X: if (3 > 2) return 1 jited:1 27 PASS [ 6379.737839] test_bpf: #500 JMP_JGT_X: Unsigned jump: if (-1 > 1) return 1 jited:1 27 PASS [ 6379.739314] test_bpf: #501 JMP_JLT_X: if (2 < 3) return 1 jited:1 28 PASS [ 6379.740565] test_bpf: #502 JMP_JLT_X: Unsigned jump: if (1 < -1) return 1 jited:1 27 PASS [ 6379.742163] test_bpf: #503 JMP_JGE_X: if (3 >= 2) return 1 jited:1 27 PASS [ 6379.743508] test_bpf: #504 JMP_JGE_X: if (3 >= 3) return 1 jited:1 27 PASS [ 6379.744883] test_bpf: #505 JMP_JLE_X: if (2 <= 3) return 1 jited:1 28 PASS [ 6379.746173] test_bpf: #506 JMP_JLE_X: if (3 <= 3) return 1 jited:1 30 PASS [ 6379.747440] test_bpf: #507 JMP_JGE_X: ldimm64 test 1 jited:1 27 PASS [ 6379.748654] test_bpf: #508 JMP_JGE_X: ldimm64 test 2 jited:1 27 PASS [ 6379.749955] test_bpf: #509 JMP_JGE_X: ldimm64 test 3 jited:1 27 PASS [ 6379.751216] test_bpf: #510 JMP_JLE_X: ldimm64 test 1 jited:1 27 PASS [ 6379.752410] test_bpf: #511 JMP_JLE_X: ldimm64 test 2 jited:1 27 PASS [ 6379.753612] test_bpf: #512 JMP_JLE_X: ldimm64 test 3 jited:1 27 PASS [ 6379.754809] test_bpf: #513 JMP_JNE_X: if (3 != 2) return 1 jited:1 29 PASS [ 6379.756102] test_bpf: #514 JMP_JEQ_X: if (3 == 3) return 1 jited:1 27 PASS [ 6379.757365] test_bpf: #515 JMP_JSET_X: if (0x3 & 0x2) return 1 jited:1 38 PASS [ 6379.758688] test_bpf: #516 JMP_JSET_X: if (0x3 & 0xffffffff) return 1 jited:1 28 PASS [ 6379.760076] test_bpf: #517 JMP_JA: Jump, gap, jump, ... jited:1 26 PASS [ 6379.761351] test_bpf: #518 BPF_MAXINSNS: Maximum possible literals jited:1 26 PASS [ 6379.766155] test_bpf: #519 BPF_MAXINSNS: Single literal jited:1 26 PASS [ 6379.770553] test_bpf: #520 BPF_MAXINSNS: Run/add until end jited:1 1786 PASS [ 6379.775205] test_bpf: #521 BPF_MAXINSNS: Too many instructions PASS [ 6379.776459] test_bpf: #522 BPF_MAXINSNS: Very long jump jited:1 37 PASS [ 6379.783238] test_bpf: #523 BPF_MAXINSNS: Ctx heavy transformations jited:1 2322 2241 PASS [ 6379.793861] test_bpf: #524 BPF_MAXINSNS: Call heavy transformations jited:1 33155 33243 PASS [ 6379.865827] test_bpf: #525 BPF_MAXINSNS: Jump heavy test jited:1 1671 PASS [ 6379.872451] test_bpf: #526 BPF_MAXINSNS: Very long jump backwards jited:1 27 PASS [ 6379.874633] test_bpf: #527 BPF_MAXINSNS: Edge hopping nuthouse jited:1 12929 PASS [ 6379.890370] test_bpf: #528 BPF_MAXINSNS: Jump, gap, jump, ... jited:1 54 PASS [ 6379.894344] test_bpf: #529 BPF_MAXINSNS: jump over MSH PASS [ 6379.898356] test_bpf: #530 BPF_MAXINSNS: exec all MSH jited:1 9447 PASS [ 6379.926849] test_bpf: #531 BPF_MAXINSNS: ld_abs+get_processor_id jited:1 16527 PASS [ 6379.954803] test_bpf: #532 LD_IND byte frag jited:1 118 PASS [ 6379.956072] test_bpf: #533 LD_IND halfword frag jited:1 123 PASS [ 6379.957306] test_bpf: #534 LD_IND word frag jited:1 130 PASS [ 6379.958468] test_bpf: #535 LD_IND halfword mixed head/frag jited:1 159 PASS [ 6379.959966] test_bpf: #536 LD_IND word mixed head/frag jited:1 158 PASS [ 6379.961300] test_bpf: #537 LD_ABS byte frag jited:1 131 PASS [ 6379.962455] test_bpf: #538 LD_ABS halfword frag jited:1 121 PASS [ 6379.963725] test_bpf: #539 LD_ABS word frag jited:1 142 PASS [ 6379.964956] test_bpf: #540 LD_ABS halfword mixed head/frag jited:1 161 PASS [ 6379.966330] test_bpf: #541 LD_ABS word mixed head/frag jited:1 162 PASS [ 6379.967689] test_bpf: #542 LD_IND byte default X jited:1 37 PASS [ 6379.968834] test_bpf: #543 LD_IND byte positive offset jited:1 36 PASS [ 6379.970003] test_bpf: #544 LD_IND byte negative offset jited:1 36 PASS [ 6379.971168] test_bpf: #545 LD_IND byte positive offset, all ff jited:1 36 PASS [ 6379.972411] test_bpf: #546 LD_IND byte positive offset, out of bounds jited:1 46 PASS [ 6379.973746] test_bpf: #547 LD_IND byte negative offset, out of bounds jited:1 47 PASS [ 6379.975112] test_bpf: #548 LD_IND byte negative offset, multiple calls jited:1 123 PASS [ 6379.976563] test_bpf: #549 LD_IND halfword positive offset jited:1 39 PASS [ 6379.977769] test_bpf: #550 LD_IND halfword negative offset jited:1 40 PASS [ 6379.978999] test_bpf: #551 LD_IND halfword unaligned jited:1 39 PASS [ 6379.980133] test_bpf: #552 LD_IND halfword positive offset, all ff jited:1 39 PASS [ 6379.981428] test_bpf: #553 LD_IND halfword positive offset, out of bounds jited:1 47 PASS [ 6379.982814] test_bpf: #554 LD_IND halfword negative offset, out of bounds jited:1 47 PASS [ 6379.984203] test_bpf: #555 LD_IND word positive offset jited:1 41 PASS [ 6379.985362] test_bpf: #556 LD_IND word negative offset jited:1 49 PASS [ 6379.986535] test_bpf: #557 LD_IND word unaligned (addr & 3 == 2) jited:1 40 PASS [ 6379.987813] test_bpf: #558 LD_IND word unaligned (addr & 3 == 1) jited:1 42 PASS [ 6379.989099] test_bpf: #559 LD_IND word unaligned (addr & 3 == 3) jited:1 40 PASS [ 6379.990369] test_bpf: #560 LD_IND word positive offset, all ff jited:1 47 PASS [ 6379.991622] test_bpf: #561 LD_IND word positive offset, out of bounds jited:1 46 PASS [ 6379.992969] test_bpf: #562 LD_IND word negative offset, out of bounds jited:1 47 PASS [ 6379.994299] test_bpf: #563 LD_ABS byte jited:1 30 PASS [ 6379.995296] test_bpf: #564 LD_ABS byte positive offset, all ff jited:1 29 PASS [ 6379.996535] test_bpf: #565 LD_ABS byte positive offset, out of bounds jited:1 47 PASS [ 6379.997866] test_bpf: #566 LD_ABS byte negative offset, out of bounds load PASS [ 6379.999063] test_bpf: #567 LD_ABS byte negative offset, in bounds jited:1 51 PASS [ 6380.000394] test_bpf: #568 LD_ABS byte negative offset, out of bounds jited:1 49 PASS [ 6380.001743] test_bpf: #569 LD_ABS byte negative offset, multiple calls jited:1 123 PASS [ 6380.003286] test_bpf: #570 LD_ABS halfword jited:1 29 PASS [ 6380.004325] test_bpf: #571 LD_ABS halfword unaligned jited:1 29 PASS [ 6380.005459] test_bpf: #572 LD_ABS halfword positive offset, all ff jited:1 29 PASS [ 6380.006756] test_bpf: #573 LD_ABS halfword positive offset, out of bounds jited:1 48 PASS [ 6380.008152] test_bpf: #574 LD_ABS halfword negative offset, out of bounds load PASS [ 6380.009300] test_bpf: #575 LD_ABS halfword negative offset, in bounds jited:1 52 PASS [ 6380.010786] test_bpf: #576 LD_ABS halfword negative offset, out of bounds jited:1 49 PASS [ 6380.012237] test_bpf: #577 LD_ABS word jited:1 29 PASS [ 6380.013218] test_bpf: #578 LD_ABS word unaligned (addr & 3 == 2) jited:1 29 PASS [ 6380.014547] test_bpf: #579 LD_ABS word unaligned (addr & 3 == 1) jited:1 29 PASS [ 6380.015843] test_bpf: #580 LD_ABS word unaligned (addr & 3 == 3) jited:1 29 PASS [ 6380.017122] test_bpf: #581 LD_ABS word positive offset, all ff jited:1 29 PASS [ 6380.018442] test_bpf: #582 LD_ABS word positive offset, out of bounds jited:1 46 PASS [ 6380.019799] test_bpf: #583 LD_ABS word negative offset, out of bounds load PASS [ 6380.020923] test_bpf: #584 LD_ABS word negative offset, in bounds jited:1 52 PASS [ 6380.022218] test_bpf: #585 LD_ABS word negative offset, out of bounds jited:1 48 PASS [ 6380.023639] test_bpf: #586 LDX_MSH standalone, preserved A jited:1 29 PASS [ 6380.024873] test_bpf: #587 LDX_MSH standalone, preserved A 2 jited:1 32 PASS [ 6380.026153] test_bpf: #588 LDX_MSH standalone, test result 1 jited:1 29 PASS [ 6380.027465] test_bpf: #589 LDX_MSH standalone, test result 2 jited:1 29 PASS [ 6380.028723] test_bpf: #590 LDX_MSH standalone, negative offset jited:1 64 PASS [ 6380.030002] test_bpf: #591 LDX_MSH standalone, negative offset 2 jited:1 50 PASS [ 6380.031286] test_bpf: #592 LDX_MSH standalone, out of bounds jited:1 48 PASS [ 6380.032540] test_bpf: #593 ADD default X jited:1 25 PASS [ 6380.033509] test_bpf: #594 ADD default A jited:1 26 PASS [ 6380.034468] test_bpf: #595 SUB default X jited:1 27 PASS [ 6380.035654] test_bpf: #596 SUB default A jited:1 27 PASS [ 6380.036633] test_bpf: #597 MUL default X jited:1 25 PASS [ 6380.037599] test_bpf: #598 MUL default A jited:1 26 PASS [ 6380.038568] test_bpf: #599 DIV default X jited:1 27 PASS [ 6380.039551] test_bpf: #600 DIV default A jited:1 26 PASS [ 6380.040505] test_bpf: #601 MOD default X jited:1 27 PASS [ 6380.041581] test_bpf: #602 MOD default A jited:1 27 PASS [ 6380.042582] test_bpf: #603 JMP EQ default A jited:1 26 PASS [ 6380.043638] test_bpf: #604 JMP EQ default X jited:1 26 PASS [ 6380.044643] test_bpf: #605 JNE signed compare, test 1 jited:1 27 PASS [ 6380.045751] test_bpf: #606 JNE signed compare, test 2 jited:1 27 PASS [ 6380.046861] test_bpf: #607 JNE signed compare, test 3 jited:1 27 PASS [ 6380.047979] test_bpf: #608 JNE signed compare, test 4 jited:1 26 PASS [ 6380.049091] test_bpf: #609 JNE signed compare, test 5 jited:1 26 PASS [ 6380.050208] test_bpf: #610 JNE signed compare, test 6 jited:1 26 PASS [ 6380.051306] test_bpf: #611 JNE signed compare, test 7 jited:1 27 PASS [ 6380.052477] test_bpf: #612 LDX_MEM_B: operand register aliasing jited:1 27 PASS [ 6380.053706] test_bpf: #613 LDX_MEM_H: operand register aliasing jited:1 27 PASS [ 6380.054934] test_bpf: #614 LDX_MEM_W: operand register aliasing jited:1 27 PASS [ 6380.056251] test_bpf: #615 LDX_MEM_DW: operand register aliasing jited:1 27 PASS [ 6380.057611] test_bpf: #616 ALU64_IMM_AND to R8: no clobbering jited:1 31 PASS [ 6380.058838] test_bpf: #617 ALU64_IMM_AND to R9: no clobbering jited:1 31 PASS [ 6380.060067] test_bpf: #618 ALU64_IMM_OR to R8: no clobbering jited:1 31 PASS [ 6380.061281] test_bpf: #619 ALU64_IMM_OR to R9: no clobbering jited:1 31 PASS [ 6380.062480] test_bpf: #620 ALU64_IMM_XOR to R8: no clobbering jited:1 31 PASS [ 6380.063726] test_bpf: #621 ALU64_IMM_XOR to R9: no clobbering jited:1 30 PASS [ 6380.064957] test_bpf: #622 ALU64_IMM_LSH to R8: no clobbering jited:1 30 PASS [ 6380.066162] test_bpf: #623 ALU64_IMM_LSH to R9: no clobbering jited:1 31 PASS [ 6380.067371] test_bpf: #624 ALU64_IMM_RSH to R8: no clobbering jited:1 31 PASS [ 6380.068572] test_bpf: #625 ALU64_IMM_RSH to R9: no clobbering jited:1 30 PASS [ 6380.069784] test_bpf: #626 ALU64_IMM_ARSH to R8: no clobbering jited:1 50 PASS [ 6380.071007] test_bpf: #627 ALU64_IMM_ARSH to R9: no clobbering jited:1 29 PASS [ 6380.072239] test_bpf: #628 ALU64_IMM_ADD to R8: no clobbering jited:1 30 PASS [ 6380.073449] test_bpf: #629 ALU64_IMM_ADD to R9: no clobbering jited:1 31 PASS [ 6380.074653] test_bpf: #630 ALU64_IMM_SUB to R8: no clobbering jited:1 31 PASS [ 6380.075860] test_bpf: #631 ALU64_IMM_SUB to R9: no clobbering jited:1 31 PASS [ 6380.077076] test_bpf: #632 ALU64_IMM_MUL to R8: no clobbering jited:1 31 PASS [ 6380.078423] test_bpf: #633 ALU64_IMM_MUL to R9: no clobbering jited:1 30 PASS [ 6380.079677] test_bpf: #634 ALU64_IMM_DIV to R8: no clobbering jited:1 37 PASS [ 6380.080908] test_bpf: #635 ALU64_IMM_DIV to R9: no clobbering jited:1 38 PASS [ 6380.082131] test_bpf: #636 ALU64_IMM_MOD to R8: no clobbering jited:1 38 PASS [ 6380.083355] test_bpf: #637 ALU64_IMM_MOD to R9: no clobbering jited:1 38 PASS [ 6380.084585] test_bpf: #638 ALU32_IMM_AND to R8: no clobbering jited:1 31 PASS [ 6380.085797] test_bpf: #639 ALU32_IMM_AND to R9: no clobbering jited:1 30 PASS [ 6380.087028] test_bpf: #640 ALU32_IMM_OR to R8: no clobbering jited:1 31 PASS [ 6380.088245] test_bpf: #641 ALU32_IMM_OR to R9: no clobbering jited:1 30 PASS [ 6380.089448] test_bpf: #642 ALU32_IMM_XOR to R8: no clobbering jited:1 30 PASS [ 6380.090673] test_bpf: #643 ALU32_IMM_XOR to R9: no clobbering jited:1 30 PASS [ 6380.092190] test_bpf: #644 ALU32_IMM_LSH to R8: no clobbering jited:1 33 PASS [ 6380.093522] test_bpf: #645 ALU32_IMM_LSH to R9: no clobbering jited:1 30 PASS [ 6380.094803] test_bpf: #646 ALU32_IMM_RSH to R8: no clobbering jited:1 30 PASS [ 6380.096164] test_bpf: #647 ALU32_IMM_RSH to R9: no clobbering jited:1 31 PASS [ 6380.097827] test_bpf: #648 ALU32_IMM_ARSH to R8: no clobbering jited:1 30 PASS [ 6380.099151] test_bpf: #649 ALU32_IMM_ARSH to R9: no clobbering jited:1 30 PASS [ 6380.100404] test_bpf: #650 ALU32_IMM_ADD to R8: no clobbering jited:1 31 PASS [ 6380.102099] test_bpf: #651 ALU32_IMM_ADD to R9: no clobbering jited:1 30 PASS [ 6380.103413] test_bpf: #652 ALU32_IMM_SUB to R8: no clobbering jited:1 31 PASS [ 6380.104652] test_bpf: #653 ALU32_IMM_SUB to R9: no clobbering jited:1 31 PASS [ 6380.105941] test_bpf: #654 ALU32_IMM_MUL to R8: no clobbering jited:1 30 PASS [ 6380.107162] test_bpf: #655 ALU32_IMM_MUL to R9: no clobbering jited:1 31 PASS [ 6380.108364] test_bpf: #656 ALU32_IMM_DIV to R8: no clobbering jited:1 39 PASS [ 6380.109589] test_bpf: #657 ALU32_IMM_DIV to R9: no clobbering jited:1 32 PASS [ 6380.110804] test_bpf: #658 ALU32_IMM_MOD to R8: no clobbering jited:1 32 PASS [ 6380.112368] test_bpf: #659 ALU32_IMM_MOD to R9: no clobbering jited:1 43 PASS [ 6380.113625] test_bpf: #660 ALU64_REG_AND to R8: no clobbering jited:1 31 PASS [ 6380.114847] test_bpf: #661 ALU64_REG_AND to R9: no clobbering jited:1 31 PASS [ 6380.116227] test_bpf: #662 ALU64_REG_OR to R8: no clobbering jited:1 53 PASS [ 6380.117820] test_bpf: #663 ALU64_REG_OR to R9: no clobbering jited:1 30 PASS [ 6380.119062] test_bpf: #664 ALU64_REG_XOR to R8: no clobbering jited:1 30 PASS [ 6380.120586] test_bpf: #665 ALU64_REG_XOR to R9: no clobbering jited:1 31 PASS [ 6380.121817] test_bpf: #666 ALU64_REG_LSH to R8: no clobbering jited:1 29 PASS [ 6380.123023] test_bpf: #667 ALU64_REG_LSH to R9: no clobbering jited:1 30 PASS [ 6380.124214] test_bpf: #668 ALU64_REG_RSH to R8: no clobbering jited:1 31 PASS [ 6380.125409] test_bpf: #669 ALU64_REG_RSH to R9: no clobbering jited:1 31 PASS [ 6380.126618] test_bpf: #670 ALU64_REG_ARSH to R8: no clobbering jited:1 31 PASS [ 6380.127824] test_bpf: #671 ALU64_REG_ARSH to R9: no clobbering jited:1 30 PASS [ 6380.129042] test_bpf: #672 ALU64_REG_ADD to R8: no clobbering jited:1 30 PASS [ 6380.130407] test_bpf: #673 ALU64_REG_ADD to R9: no clobbering jited:1 37 PASS [ 6380.131866] test_bpf: #674 ALU64_REG_SUB to R8: no clobbering jited:1 31 PASS [ 6380.133089] test_bpf: #675 ALU64_REG_SUB to R9: no clobbering jited:1 30 PASS [ 6380.134299] test_bpf: #676 ALU64_REG_MUL to R8: no clobbering jited:1 30 PASS [ 6380.135796] test_bpf: #677 ALU64_REG_MUL to R9: no clobbering jited:1 29 PASS [ 6380.137045] test_bpf: #678 ALU64_REG_DIV to R8: no clobbering jited:1 38 PASS [ 6380.138543] test_bpf: #679 ALU64_REG_DIV to R9: no clobbering jited:1 38 PASS [ 6380.139777] test_bpf: #680 ALU64_REG_MOD to R8: no clobbering jited:1 37 PASS [ 6380.141136] test_bpf: #681 ALU64_REG_MOD to R9: no clobbering jited:1 38 PASS [ 6380.142372] test_bpf: #682 ALU32_REG_AND to R8: no clobbering jited:1 41 PASS [ 6380.143577] test_bpf: #683 ALU32_REG_AND to R9: no clobbering jited:1 30 PASS [ 6380.144791] test_bpf: #684 ALU32_REG_OR to R8: no clobbering jited:1 30 PASS [ 6380.146161] test_bpf: #685 ALU32_REG_OR to R9: no clobbering jited:1 129 PASS [ 6380.147930] test_bpf: #686 ALU32_REG_XOR to R8: no clobbering jited:1 31 PASS [ 6380.149159] test_bpf: #687 ALU32_REG_XOR to R9: no clobbering jited:1 31 PASS [ 6380.150461] test_bpf: #688 ALU32_REG_LSH to R8: no clobbering jited:1 30 PASS [ 6380.151881] test_bpf: #689 ALU32_REG_LSH to R9: no clobbering jited:1 39 PASS [ 6380.153300] test_bpf: #690 ALU32_REG_RSH to R8: no clobbering jited:1 31 PASS [ 6380.154532] test_bpf: #691 ALU32_REG_RSH to R9: no clobbering jited:1 30 PASS [ 6380.155857] test_bpf: #692 ALU32_REG_ARSH to R8: no clobbering jited:1 31 PASS [ 6380.157110] test_bpf: #693 ALU32_REG_ARSH to R9: no clobbering jited:1 31 PASS [ 6380.158341] test_bpf: #694 ALU32_REG_ADD to R8: no clobbering jited:1 31 PASS [ 6380.159540] test_bpf: #695 ALU32_REG_ADD to R9: no clobbering jited:1 30 PASS [ 6380.160820] test_bpf: #696 ALU32_REG_SUB to R8: no clobbering jited:1 31 PASS [ 6380.162055] test_bpf: #697 ALU32_REG_SUB to R9: no clobbering jited:1 31 PASS [ 6380.163259] test_bpf: #698 ALU32_REG_MUL to R8: no clobbering jited:1 30 PASS [ 6380.164457] test_bpf: #699 ALU32_REG_MUL to R9: no clobbering jited:1 30 PASS [ 6380.165661] test_bpf: #700 ALU32_REG_DIV to R8: no clobbering jited:1 31 PASS [ 6380.167782] test_bpf: #701 ALU32_REG_DIV to R9: no clobbering jited:1 32 PASS [ 6380.169015] test_bpf: #702 ALU32_REG_MOD to R8: no clobbering jited:1 32 PASS [ 6380.170229] test_bpf: #703 ALU32_REG_MOD to R9: no clobbering jited:1 31 PASS [ 6380.171428] test_bpf: #704 Atomic_BPF_DW BPF_ADD: no clobbering jited:1 34 PASS [ 6380.172690] test_bpf: #705 Atomic_BPF_DW BPF_AND: no clobbering jited:1 34 PASS [ 6380.173939] test_bpf: #706 Atomic_BPF_DW BPF_OR: no clobbering jited:1 33 PASS [ 6380.175155] test_bpf: #707 Atomic_BPF_DW BPF_XOR: no clobbering jited:1 33 PASS [ 6380.176423] test_bpf: #708 Atomic_BPF_DW BPF_ADD | BPF_FETCH: no clobbering jited:1 34 PASS [ 6380.177791] test_bpf: #709 Atomic_BPF_DW BPF_AND | BPF_FETCH: no clobbering jited:1 34 PASS [ 6380.179173] test_bpf: #710 Atomic_BPF_DW BPF_OR | BPF_FETCH: no clobbering jited:1 33 PASS [ 6380.180531] test_bpf: #711 Atomic_BPF_DW BPF_XOR | BPF_FETCH: no clobbering jited:1 33 PASS [ 6380.181918] test_bpf: #712 Atomic_BPF_DW BPF_XCHG: no clobbering jited:1 33 PASS [ 6380.183162] test_bpf: #713 Atomic_BPF_DW BPF_CMPXCHG: no clobbering jited:1 33 PASS [ 6380.184432] test_bpf: #714 Atomic_BPF_W BPF_ADD: no clobbering jited:1 33 PASS [ 6380.185667] test_bpf: #715 Atomic_BPF_W BPF_AND: no clobbering jited:1 33 PASS [ 6380.187038] test_bpf: #716 Atomic_BPF_W BPF_OR: no clobbering jited:1 33 PASS [ 6380.188267] test_bpf: #717 Atomic_BPF_W BPF_XOR: no clobbering jited:1 33 PASS [ 6380.189739] test_bpf: #718 Atomic_BPF_W BPF_ADD | BPF_FETCH: no clobbering jited:1 70 PASS [ 6380.191252] test_bpf: #719 Atomic_BPF_W BPF_AND | BPF_FETCH: no clobbering jited:1 34 PASS [ 6380.192629] test_bpf: #720 Atomic_BPF_W BPF_OR | BPF_FETCH: no clobbering jited:1 34 PASS [ 6380.193952] test_bpf: #721 Atomic_BPF_W BPF_XOR | BPF_FETCH: no clobbering jited:1 34 PASS [ 6380.195303] test_bpf: #722 Atomic_BPF_W BPF_XCHG: no clobbering jited:1 33 PASS [ 6380.196562] test_bpf: #723 Atomic_BPF_W BPF_CMPXCHG: no clobbering jited:1 34 PASS [ 6380.197861] test_bpf: #724 ALU32_MOV_X: src preserved in zext jited:1 27 PASS [ 6380.199060] test_bpf: #725 ALU32_AND_X: src preserved in zext jited:1 27 PASS [ 6380.200246] test_bpf: #726 ALU32_OR_X: src preserved in zext jited:1 27 PASS [ 6380.201411] test_bpf: #727 ALU32_XOR_X: src preserved in zext jited:1 27 PASS [ 6380.202620] test_bpf: #728 ALU32_ADD_X: src preserved in zext jited:1 27 PASS [ 6380.203822] test_bpf: #729 ALU32_SUB_X: src preserved in zext jited:1 27 PASS [ 6380.205030] test_bpf: #730 ALU32_MUL_X: src preserved in zext jited:1 27 PASS [ 6380.206210] test_bpf: #731 ALU32_DIV_X: src preserved in zext jited:1 27 PASS [ 6380.207409] test_bpf: #732 ALU32_MOD_X: src preserved in zext jited:1 27 PASS [ 6380.208600] test_bpf: #733 ATOMIC_W_ADD: src preserved in zext jited:1 31 PASS [ 6380.209822] test_bpf: #734 ATOMIC_W_AND: src preserved in zext jited:1 31 PASS [ 6380.211045] test_bpf: #735 ATOMIC_W_OR: src preserved in zext jited:1 31 PASS [ 6380.212234] test_bpf: #736 ATOMIC_W_XOR: src preserved in zext jited:1 31 PASS [ 6380.213429] test_bpf: #737 ATOMIC_W_CMPXCHG: src preserved in zext jited:1 32 PASS [ 6380.214691] test_bpf: #738 JMP32_JEQ_K: operand preserved in zext jited:1 27 PASS [ 6380.215965] test_bpf: #739 JMP32_JNE_K: operand preserved in zext jited:1 27 PASS [ 6380.217213] test_bpf: #740 JMP32_JSET_K: operand preserved in zext jited:1 27 PASS [ 6380.218579] test_bpf: #741 JMP32_JGT_K: operand preserved in zext jited:1 27 PASS [ 6380.219836] test_bpf: #742 JMP32_JGE_K: operand preserved in zext jited:1 27 PASS [ 6380.221094] test_bpf: #743 JMP32_JLT_K: operand preserved in zext jited:1 27 PASS [ 6380.222363] test_bpf: #744 JMP32_JLE_K: operand preserved in zext jited:1 26 PASS [ 6380.223606] test_bpf: #745 JMP32_JSGT_K: operand preserved in zext jited:1 27 PASS [ 6380.224847] test_bpf: #746 JMP32_JSGE_K: operand preserved in zext jited:1 27 PASS [ 6380.226215] test_bpf: #747 JMP32_JSGT_K: operand preserved in zext jited:1 27 PASS [ 6380.227477] test_bpf: #748 JMP32_JSLT_K: operand preserved in zext jited:1 27 PASS [ 6380.228737] test_bpf: #749 JMP32_JSLE_K: operand preserved in zext jited:1 27 PASS [ 6380.230015] test_bpf: #750 JMP32_JEQ_X: operands preserved in zext jited:1 28 PASS [ 6380.231273] test_bpf: #751 JMP32_JNE_X: operands preserved in zext jited:1 27 PASS [ 6380.232532] test_bpf: #752 JMP32_JSET_X: operands preserved in zext jited:1 27 PASS [ 6380.233929] test_bpf: #753 JMP32_JGT_X: operands preserved in zext jited:1 28 PASS [ 6380.235211] test_bpf: #754 JMP32_JGE_X: operands preserved in zext jited:1 28 PASS [ 6380.236483] test_bpf: #755 JMP32_JLT_X: operands preserved in zext jited:1 28 PASS [ 6380.237787] test_bpf: #756 JMP32_JLE_X: operands preserved in zext jited:1 28 PASS [ 6380.239048] test_bpf: #757 JMP32_JSGT_X: operands preserved in zext jited:1 28 PASS [ 6380.240326] test_bpf: #758 JMP32_JSGE_X: operands preserved in zext jited:1 27 PASS [ 6380.241597] test_bpf: #759 JMP32_JSGT_X: operands preserved in zext jited:1 28 PASS [ 6380.242863] test_bpf: #760 JMP32_JSLT_X: operands preserved in zext jited:1 27 PASS [ 6380.244136] test_bpf: #761 JMP32_JSLE_X: operands preserved in zext jited:1 27 PASS [ 6380.245402] test_bpf: #762 ALU64_MOV_K: registers jited:1 42 PASS [ 6380.246534] test_bpf: #763 ALU64_AND_K: registers jited:1 40 PASS [ 6380.247657] test_bpf: #764 ALU64_OR_K: registers jited:1 41 PASS [ 6380.248752] test_bpf: #765 ALU64_XOR_K: registers jited:1 42 PASS [ 6380.250018] test_bpf: #766 ALU64_LSH_K: registers jited:1 42 PASS [ 6380.251151] test_bpf: #767 ALU64_RSH_K: registers jited:1 41 PASS [ 6380.252266] test_bpf: #768 ALU64_ARSH_K: registers jited:1 51 PASS [ 6380.253436] test_bpf: #769 ALU64_ADD_K: registers jited:1 41 PASS [ 6380.254561] test_bpf: #770 ALU64_SUB_K: registers jited:1 41 PASS [ 6380.255674] test_bpf: #771 ALU64_MUL_K: registers jited:1 43 PASS [ 6380.256800] test_bpf: #772 ALU64_DIV_K: registers jited:1 127 PASS [ 6380.258014] test_bpf: #773 ALU64_MOD_K: registers jited:1 126 PASS [ 6380.259222] test_bpf: #774 ALU32_MOV_K: registers jited:1 43 PASS [ 6380.260315] test_bpf: #775 ALU32_AND_K: registers jited:1 40 PASS [ 6380.261413] test_bpf: #776 ALU32_OR_K: registers jited:1 42 PASS [ 6380.262517] test_bpf: #777 ALU32_XOR_K: registers jited:1 41 PASS [ 6380.263759] test_bpf: #778 ALU32_LSH_K: registers jited:1 43 PASS [ 6380.264963] test_bpf: #779 ALU32_RSH_K: registers jited:1 41 PASS [ 6380.266087] test_bpf: #780 ALU32_ARSH_K: registers jited:1 41 PASS [ 6380.267199] test_bpf: #781 ALU32_ADD_K: registers jited:1 42 PASS [ 6380.268299] test_bpf: #782 ALU32_SUB_K: registers jited:1 41 PASS [ 6380.269415] test_bpf: #783 ALU32_MUL_K: registers jited:1 52 PASS [ 6380.270552] test_bpf: #784 ALU32_DIV_K: registers jited:1 60 PASS [ 6380.271682] test_bpf: #785 ALU32_MOD_K: registers jited:1 89 PASS [ 6380.272812] test_bpf: #786 ALU64_MOV_X: register combinations jited:1 207 PASS [ 6380.274509] test_bpf: #787 ALU64_AND_X: register combinations jited:1 202 PASS [ 6380.276218] test_bpf: #788 ALU64_OR_X: register combinations jited:1 200 PASS [ 6380.277852] test_bpf: #789 ALU64_XOR_X: register combinations jited:1 201 PASS [ 6380.279516] test_bpf: #790 ALU64_LSH_X: register combinations jited:1 247 PASS [ 6380.281200] test_bpf: #791 ALU64_RSH_X: register combinations jited:1 231 PASS [ 6380.282902] test_bpf: #792 ALU64_ARSH_X: register combinations jited:1 227 PASS [ 6380.285541] test_bpf: #793 ALU64_ADD_X: register combinations jited:1 201 PASS [ 6380.287236] test_bpf: #794 ALU64_SUB_X: register combinations jited:1 200 PASS [ 6380.289086] test_bpf: #795 ALU64_MUL_X: register combinations jited:1 223 PASS [ 6380.290922] test_bpf: #796 ALU64_DIV_X: register combinations jited:1 1141 PASS [ 6380.293701] test_bpf: #797 ALU64_MOD_X: register combinations jited:1 1138 PASS [ 6380.296475] test_bpf: #798 ALU32_MOV_X: register combinations jited:1 356 PASS [ 6380.298959] test_bpf: #799 ALU32_AND_X: register combinations jited:1 309 PASS [ 6380.301488] test_bpf: #800 ALU32_OR_X: register combinations jited:1 295 PASS [ 6380.303938] test_bpf: #801 ALU32_XOR_X: register combinations jited:1 279 PASS [ 6380.306357] test_bpf: #802 ALU32_LSH_X: register combinations jited:1 356 PASS [ 6380.309016] test_bpf: #803 ALU32_RSH_X: register combinations jited:1 352 PASS [ 6380.311463] test_bpf: #804 ALU32_ARSH_X: register combinations jited:1 369 PASS [ 6380.314016] test_bpf: #805 ALU32_ADD_X: register combinations jited:1 330 PASS [ 6380.316446] test_bpf: #806 ALU32_SUB_X: register combinations jited:1 285 PASS [ 6380.318920] test_bpf: #807 ALU32_MUL_X: register combinations jited:1 292 PASS [ 6380.321353] test_bpf: #808 ALU32_DIV_X: register combinations jited:1 583 PASS [ 6380.324203] test_bpf: #809 ALU32_MOD_X register combinations jited:1 591 PASS [ 6380.327049] test_bpf: #810 ALU64_LSH_K: all shift values jited:1 562 PASS [ 6380.329856] test_bpf: #811 ALU64_RSH_K: all shift values jited:1 572 PASS [ 6380.332672] test_bpf: #812 ALU64_ARSH_K: all shift values jited:1 521 PASS [ 6380.335457] test_bpf: #813 ALU64_LSH_X: all shift values jited:1 379 PASS [ 6380.337368] test_bpf: #814 ALU64_RSH_X: all shift values jited:1 410 PASS [ 6380.339432] test_bpf: #815 ALU64_ARSH_X: all shift values jited:1 380 PASS [ 6380.341322] test_bpf: #816 ALU32_LSH_K: all shift values jited:1 126 PASS [ 6380.342767] test_bpf: #817 ALU32_RSH_K: all shift values jited:1 125 PASS [ 6380.344255] test_bpf: #818 ALU32_ARSH_K: all shift values jited:1 129 PASS [ 6380.345782] test_bpf: #819 ALU32_LSH_X: all shift values jited:1 187 PASS [ 6380.347281] test_bpf: #820 ALU32_RSH_X: all shift values jited:1 192 PASS [ 6380.348954] test_bpf: #821 ALU32_ARSH_X: all shift values jited:1 191 PASS [ 6380.350501] test_bpf: #822 ALU64_LSH_X: all shift values with the same register jited:1 114 PASS [ 6380.352098] test_bpf: #823 ALU64_RSH_X: all shift values with the same register jited:1 109 PASS [ 6380.353657] test_bpf: #824 ALU64_ARSH_X: all shift values with the same register jited:1 131 PASS [ 6380.355225] test_bpf: #825 ALU32_LSH_X: all shift values with the same register jited:1 66 PASS [ 6380.356712] test_bpf: #826 ALU32_RSH_X: all shift values with the same register jited:1 88 PASS [ 6380.358188] test_bpf: #827 ALU32_ARSH_X: all shift values with the same register jited:1 67 PASS [ 6380.359669] test_bpf: #828 ALU64_MOV_K: all immediate value magnitudes jited:1 158733 PASS [ 6380.380972] test_bpf: #829 ALU64_AND_K: all immediate value magnitudes jited:1 184680 PASS [ 6380.404269] test_bpf: #830 ALU64_OR_K: all immediate value magnitudes jited:1 141328 PASS [ 6380.424783] test_bpf: #831 ALU64_XOR_K: all immediate value magnitudes jited:1 133726 PASS [ 6380.445779] test_bpf: #832 ALU64_ADD_K: all immediate value magnitudes jited:1 141063 PASS [ 6380.469280] test_bpf: #833 ALU64_SUB_K: all immediate value magnitudes jited:1 181446 PASS [ 6380.492637] test_bpf: #834 ALU64_MUL_K: all immediate value magnitudes jited:1 137414 PASS [ 6380.513724] test_bpf: #835 ALU64_DIV_K: all immediate value magnitudes jited:1 310865 PASS [ 6380.538621] test_bpf: #836 ALU64_MOD_K: all immediate value magnitudes jited:1 236748 PASS [ 6380.566344] test_bpf: #837 ALU32_MOV_K: all immediate value magnitudes jited:1 117131 PASS [ 6380.590064] test_bpf: #838 ALU32_AND_K: all immediate value magnitudes jited:1 120109 PASS [ 6380.610690] test_bpf: #839 ALU32_OR_K: all immediate value magnitudes jited:1 117882 PASS [ 6380.631023] test_bpf: #840 ALU32_XOR_K: all immediate value magnitudes jited:1 114539 PASS [ 6380.650979] test_bpf: #841 ALU32_ADD_K: all immediate value magnitudes jited:1 146756 PASS [ 6380.673215] test_bpf: #842 ALU32_SUB_K: all immediate value magnitudes jited:1 159149 PASS [ 6380.699908] test_bpf: #843 ALU32_MUL_K: all immediate value magnitudes jited:1 187778 PASS [ 6380.721423] test_bpf: #844 ALU32_DIV_K: all immediate value magnitudes jited:1 246026 PASS [ 6380.749186] test_bpf: #845 ALU32_MOD_K: all immediate value magnitudes jited:1 259876 PASS [ 6380.773541] test_bpf: #846 ALU64_MOV_X: all register value magnitudes jited:1 249417 PASS [ 6380.813756] test_bpf: #847 ALU64_AND_X: all register value magnitudes jited:1 294682 PASS [ 6380.859711] test_bpf: #848 ALU64_OR_X: all register value magnitudes jited:1 282082 PASS [ 6380.899950] test_bpf: #849 ALU64_XOR_X: all register value magnitudes jited:1 239624 PASS [ 6380.938882] test_bpf: #850 ALU64_ADD_X: all register value magnitudes jited:1 279460 PASS [ 6380.986084] test_bpf: #851 ALU64_SUB_X: all register value magnitudes jited:1 276446 PASS [ 6381.025907] test_bpf: #852 ALU64_MUL_X: all register value magnitudes jited:1 254061 PASS [ 6381.067990] test_bpf: #853 ALU64_DIV_X: all register value magnitudes jited:1 446983 PASS [ 6381.112883] test_bpf: #854 ALU64_MOD_X: all register value magnitudes jited:1 663953 PASS [ 6381.174077] test_bpf: #855 ALU32_MOV_X: all register value magnitudes jited:1 252443 PASS [ 6381.226669] test_bpf: #856 ALU32_AND_X: all register value magnitudes jited:1 240851 PASS [ 6381.264891] test_bpf: #857 ALU32_OR_X: all register value magnitudes jited:1 256429 PASS [ 6381.310587] test_bpf: #858 ALU32_XOR_X: all register value magnitudes jited:1 298021 PASS [ 6381.350287] test_bpf: #859 ALU32_ADD_X: all register value magnitudes jited:1 384851 PASS [ 6381.398474] test_bpf: #860 ALU32_SUB_X: all register value magnitudes jited:1 284641 PASS [ 6381.451905] test_bpf: #861 ALU32_MUL_X: all register value magnitudes jited:1 260322 PASS [ 6381.512236] test_bpf: #862 ALU32_DIV_X: all register value magnitudes jited:1 271686 PASS [ 6381.544706] test_bpf: #863 ALU32_MOD_X: all register value magnitudes jited:1 222224 PASS [ 6381.573240] test_bpf: #864 LD_IMM64: all immediate value magnitudes jited:1 37718 PASS [ 6381.627325] test_bpf: #865 LD_IMM64: checker byte patterns jited:1 302 PASS [ 6381.629354] test_bpf: #866 LD_IMM64: random positive and zero byte patterns jited:1 309 PASS [ 6381.631535] test_bpf: #867 LD_IMM64: random negative and zero byte patterns jited:1 305 PASS [ 6381.633658] test_bpf: #868 LD_IMM64: random positive and negative byte patterns jited:1 313 PASS [ 6381.635842] test_bpf: #869 ATOMIC_DW_ADD: register combinations jited:1 1406 PASS [ 6381.639209] test_bpf: #870 ATOMIC_DW_AND: register combinations jited:1 1420 PASS [ 6381.642826] test_bpf: #871 ATOMIC_DW_OR: register combinations jited:1 1448 PASS [ 6381.646346] test_bpf: #872 ATOMIC_DW_XOR: register combinations jited:1 1419 PASS [ 6381.649897] test_bpf: #873 ATOMIC_DW_ADD_FETCH: register combinations jited:1 1448 PASS [ 6381.653477] test_bpf: #874 ATOMIC_DW_AND_FETCH: register combinations jited:1 1420 PASS [ 6381.657122] test_bpf: #875 ATOMIC_DW_OR_FETCH: register combinations jited:1 1410 PASS [ 6381.660608] test_bpf: #876 ATOMIC_DW_XOR_FETCH: register combinations jited:1 1444 PASS [ 6381.664178] test_bpf: #877 ATOMIC_DW_XCHG: register combinations jited:1 1413 PASS [ 6381.667804] test_bpf: #878 ATOMIC_DW_CMPXCHG: register combinations jited:1 1439 PASS [ 6381.671306] test_bpf: #879 ATOMIC_W_ADD: register combinations jited:1 1416 PASS [ 6381.674841] test_bpf: #880 ATOMIC_W_AND: register combinations jited:1 1439 PASS [ 6381.678272] test_bpf: #881 ATOMIC_W_OR: register combinations jited:1 1412 PASS [ 6381.681800] test_bpf: #882 ATOMIC_W_XOR: register combinations jited:1 1437 PASS [ 6381.685292] test_bpf: #883 ATOMIC_W_ADD_FETCH: register combinations jited:1 1412 PASS [ 6381.688968] test_bpf: #884 ATOMIC_W_AND_FETCH: register combinations jited:1 1412 PASS [ 6381.692604] test_bpf: #885 ATOMIC_W_OR_FETCH: register combinations jited:1 1512 PASS [ 6381.696509] test_bpf: #886 ATOMIC_W_XOR_FETCH: register combinations jited:1 1486 PASS [ 6381.700426] test_bpf: #887 ATOMIC_W_XCHG: register combinations jited:1 1440 PASS [ 6381.703922] test_bpf: #888 ATOMIC_W_CMPXCHG: register combinations jited:1 1415 PASS [ 6381.707389] test_bpf: #889 ATOMIC_DW_ADD: all operand magnitudes jited:1 219548 PASS [ 6381.736473] test_bpf: #890 ATOMIC_DW_AND: all operand magnitudes jited:1 226755 PASS [ 6381.765420] test_bpf: #891 ATOMIC_DW_OR: all operand magnitudes jited:1 205599 PASS [ 6381.794083] test_bpf: #892 ATOMIC_DW_XOR: all operand magnitudes jited:1 199522 PASS [ 6381.824273] test_bpf: #893 ATOMIC_DW_ADD_FETCH: all operand magnitudes jited:1 186137 PASS [ 6381.852875] test_bpf: #894 ATOMIC_DW_AND_FETCH: all operand magnitudes jited:1 296313 PASS [ 6381.889297] test_bpf: #895 ATOMIC_DW_OR_FETCH: all operand magnitudes jited:1 284276 PASS [ 6381.930303] test_bpf: #896 ATOMIC_DW_XOR_FETCH: all operand magnitudes jited:1 262379 PASS [ 6381.971247] test_bpf: #897 ATOMIC_DW_XCHG: all operand magnitudes jited:1 198428 PASS [ 6382.005219] test_bpf: #898 ATOMIC_DW_CMPXCHG: all operand magnitudes jited:1 295623 PASS [ 6382.043830] test_bpf: #899 ATOMIC_W_ADD: all operand magnitudes jited:1 243643 PASS [ 6382.073168] test_bpf: #900 ATOMIC_W_AND: all operand magnitudes jited:1 240904 PASS [ 6382.102593] test_bpf: #901 ATOMIC_W_OR: all operand magnitudes jited:1 209723 PASS [ 6382.131866] test_bpf: #902 ATOMIC_W_XOR: all operand magnitudes jited:1 213169 PASS [ 6382.161148] test_bpf: #903 ATOMIC_W_ADD_FETCH: all operand magnitudes jited:1 201912 PASS [ 6382.189805] test_bpf: #904 ATOMIC_W_AND_FETCH: all operand magnitudes jited:1 281171 PASS [ 6382.222265] test_bpf: #905 ATOMIC_W_OR_FETCH: all operand magnitudes jited:1 272150 PASS [ 6382.254159] test_bpf: #906 ATOMIC_W_XOR_FETCH: all operand magnitudes jited:1 269044 PASS [ 6382.285791] test_bpf: #907 ATOMIC_W_XCHG: all operand magnitudes jited:1 261938 PASS [ 6382.316420] test_bpf: #908 ATOMIC_W_CMPXCHG: all operand magnitudes jited:1 386142 PASS [ 6382.363121] test_bpf: #909 JMP_JSET_K: all immediate value magnitudes jited:1 130958 PASS [ 6382.382833] test_bpf: #910 JMP_JEQ_K: all immediate value magnitudes jited:1 140278 PASS [ 6382.403720] test_bpf: #911 JMP_JNE_K: all immediate value magnitudes jited:1 165734 PASS [ 6382.421797] test_bpf: #912 JMP_JGT_K: all immediate value magnitudes jited:1 122070 PASS [ 6382.443347] test_bpf: #913 JMP_JGE_K: all immediate value magnitudes jited:1 133285 PASS [ 6382.463620] test_bpf: #914 JMP_JLT_K: all immediate value magnitudes jited:1 124664 PASS [ 6382.482064] test_bpf: #915 JMP_JLE_K: all immediate value magnitudes jited:1 141245 PASS [ 6382.500594] test_bpf: #916 JMP_JSGT_K: all immediate value magnitudes jited:1 125355 PASS [ 6382.518768] test_bpf: #917 JMP_JSGE_K: all immediate value magnitudes jited:1 126384 PASS [ 6382.536780] test_bpf: #918 JMP_JSLT_K: all immediate value magnitudes jited:1 126740 PASS [ 6382.556773] test_bpf: #919 JMP_JSLE_K: all immediate value magnitudes jited:1 123882 PASS [ 6382.575258] test_bpf: #920 JMP_JSET_X: all register value magnitudes jited:1 245825 PASS [ 6382.608455] test_bpf: #921 JMP_JEQ_X: all register value magnitudes jited:1 266140 PASS [ 6382.642772] test_bpf: #922 JMP_JNE_X: all register value magnitudes jited:1 239115 PASS [ 6382.676814] test_bpf: #923 JMP_JGT_X: all register value magnitudes jited:1 230909 PASS [ 6382.717253] test_bpf: #924 JMP_JGE_X: all register value magnitudes jited:1 233405 PASS [ 6382.765708] test_bpf: #925 JMP_JLT_X: all register value magnitudes jited:1 225117 PASS [ 6382.798745] test_bpf: #926 JMP_JLE_X: all register value magnitudes jited:1 276375 PASS [ 6382.833737] test_bpf: #927 JMP_JSGT_X: all register value magnitudes jited:1 240671 PASS [ 6382.868147] test_bpf: #928 JMP_JSGE_X: all register value magnitudes jited:1 238038 PASS [ 6382.901752] test_bpf: #929 JMP_JSLT_X: all register value magnitudes jited:1 247568 PASS [ 6382.937827] test_bpf: #930 JMP_JSLE_X: all register value magnitudes jited:1 229499 PASS [ 6382.973218] test_bpf: #931 JMP32_JSET_K: all immediate value magnitudes jited:1 122241 PASS [ 6382.989545] test_bpf: #932 JMP32_JEQ_K: all immediate value magnitudes jited:1 115872 PASS [ 6383.006362] test_bpf: #933 JMP32_JNE_K: all immediate value magnitudes jited:1 118678 PASS [ 6383.020567] test_bpf: #934 JMP32_JGT_K: all immediate value magnitudes jited:1 130589 PASS [ 6383.036486] test_bpf: #935 JMP32_JGE_K: all immediate value magnitudes jited:1 132953 PASS [ 6383.052495] test_bpf: #936 JMP32_JLT_K: all immediate value magnitudes jited:1 178666 PASS [ 6383.067930] test_bpf: #937 JMP32_JLE_K: all immediate value magnitudes jited:1 196160 PASS [ 6383.085104] test_bpf: #938 JMP32_JSGT_K: all immediate value magnitudes jited:1 126807 PASS [ 6383.100710] test_bpf: #939 JMP32_JSGE_K: all immediate value magnitudes jited:1 118406 PASS [ 6383.116246] test_bpf: #940 JMP32_JSLT_K: all immediate value magnitudes jited:1 190353 PASS [ 6383.131942] test_bpf: #941 JMP32_JSLE_K: all immediate value magnitudes jited:1 130719 PASS [ 6383.149194] test_bpf: #942 JMP32_JSET_X: all register value magnitudes jited:1 315694 PASS [ 6383.179892] test_bpf: #943 JMP32_JEQ_X: all register value magnitudes jited:1 268197 PASS [ 6383.213754] test_bpf: #944 JMP32_JNE_X: all register value magnitudes jited:1 239948 PASS [ 6383.243680] test_bpf: #945 JMP32_JGT_X: all register value magnitudes jited:1 228100 PASS [ 6383.278191] test_bpf: #946 JMP32_JGE_X: all register value magnitudes jited:1 244346 PASS [ 6383.307395] test_bpf: #947 JMP32_JLT_X: all register value magnitudes jited:1 212070 PASS [ 6383.335762] test_bpf: #948 JMP32_JLE_X: all register value magnitudes jited:1 210954 PASS [ 6383.365165] test_bpf: #949 JMP32_JSGT_X: all register value magnitudes jited:1 222581 PASS [ 6383.396333] test_bpf: #950 JMP32_JSGE_X: all register value magnitudes jited:1 295350 PASS [ 6383.428583] test_bpf: #951 JMP32_JSLT_X: all register value magnitudes jited:1 236223 PASS [ 6383.458086] test_bpf: #952 JMP32_JSLE_X: all register value magnitudes jited:1 245257 PASS [ 6383.486668] test_bpf: #953 JMP_JSET_K: imm = 0 -> never taken jited:1 25 PASS [ 6383.487981] test_bpf: #954 JMP_JLT_K: imm = 0 -> never taken jited:1 25 PASS [ 6383.489188] test_bpf: #955 JMP_JGE_K: imm = 0 -> always taken jited:1 26 PASS [ 6383.490390] test_bpf: #956 JMP_JGT_K: imm = 0xffffffff -> never taken jited:1 25 PASS [ 6383.491665] test_bpf: #957 JMP_JLE_K: imm = 0xffffffff -> always taken jited:1 26 PASS [ 6383.492937] test_bpf: #958 JMP32_JSGT_K: imm = 0x7fffffff -> never taken jited:1 26 PASS [ 6383.494270] test_bpf: #959 JMP32_JSGE_K: imm = -0x80000000 -> always taken jited:1 27 PASS [ 6383.495584] test_bpf: #960 JMP32_JSLT_K: imm = -0x80000000 -> never taken jited:1 26 PASS [ 6383.496993] test_bpf: #961 JMP32_JSLE_K: imm = 0x7fffffff -> always taken jited:1 26 PASS [ 6383.498335] test_bpf: #962 JMP_JEQ_X: dst = src -> always taken jited:1 26 PASS [ 6383.499541] test_bpf: #963 JMP_JGE_X: dst = src -> always taken jited:1 26 PASS [ 6383.500782] test_bpf: #964 JMP_JLE_X: dst = src -> always taken jited:1 27 PASS [ 6383.502152] test_bpf: #965 JMP_JSGE_X: dst = src -> always taken jited:1 27 PASS [ 6383.503394] test_bpf: #966 JMP_JSLE_X: dst = src -> always taken jited:1 26 PASS [ 6383.504647] test_bpf: #967 JMP_JNE_X: dst = src -> never taken jited:1 27 PASS [ 6383.505852] test_bpf: #968 JMP_JGT_X: dst = src -> never taken jited:1 26 PASS [ 6383.507041] test_bpf: #969 JMP_JLT_X: dst = src -> never taken jited:1 26 PASS [ 6383.508260] test_bpf: #970 JMP_JSGT_X: dst = src -> never taken jited:1 26 PASS [ 6383.509521] test_bpf: #971 JMP_JSLT_X: dst = src -> never taken jited:1 26 PASS [ 6383.510771] test_bpf: #972 Short relative jump: offset=0 jited:1 26 PASS [ 6383.511885] test_bpf: #973 Short relative jump: offset=1 jited:1 26 PASS [ 6383.512990] test_bpf: #974 Short relative jump: offset=2 jited:1 26 PASS [ 6383.514108] test_bpf: #975 Short relative jump: offset=3 jited:1 36 PASS [ 6383.515321] test_bpf: #976 Short relative jump: offset=4 jited:1 27 PASS [ 6383.516601] test_bpf: #977 Long conditional jump: taken at runtime jited:1 27 PASS [ 6383.524418] test_bpf: #978 Long conditional jump: not taken at runtime jited:1 26 PASS [ 6383.531999] test_bpf: #979 Long conditional jump: always taken, known at JIT time jited:1 27 PASS [ 6383.540370] test_bpf: #980 Long conditional jump: never taken, known at JIT time jited:1 27 PASS [ 6383.548242] test_bpf: #981 Staggered jumps: JMP_JA jited:1 68564 PASS [ 6383.557781] test_bpf: #982 Staggered jumps: JMP_JEQ_K jited:1 89883 PASS [ 6383.568457] test_bpf: #983 Staggered jumps: JMP_JNE_K jited:1 91058 PASS [ 6383.579028] test_bpf: #984 Staggered jumps: JMP_JSET_K jited:1 91107 PASS [ 6383.589653] test_bpf: #985 Staggered jumps: JMP_JGT_K jited:1 100767 PASS [ 6383.600496] test_bpf: #986 Staggered jumps: JMP_JGE_K jited:1 100091 PASS [ 6383.611474] test_bpf: #987 Staggered jumps: JMP_JLT_K jited:1 94031 PASS [ 6383.622440] test_bpf: #988 Staggered jumps: JMP_JLE_K jited:1 106763 PASS [ 6383.633557] test_bpf: #989 Staggered jumps: JMP_JSGT_K jited:1 102855 PASS [ 6383.644201] test_bpf: #990 Staggered jumps: JMP_JSGE_K jited:1 130085 PASS [ 6383.658821] test_bpf: #991 Staggered jumps: JMP_JSLT_K jited:1 125626 PASS [ 6383.676376] test_bpf: #992 Staggered jumps: JMP_JSLE_K jited:1 101421 PASS [ 6383.689534] test_bpf: #993 Staggered jumps: JMP_JEQ_X jited:1 104453 PASS [ 6383.707656] test_bpf: #994 Staggered jumps: JMP_JNE_X jited:1 97871 PASS [ 6383.719185] test_bpf: #995 Staggered jumps: JMP_JSET_X jited:1 99274 PASS [ 6383.730787] test_bpf: #996 Staggered jumps: JMP_JGT_X jited:1 98848 PASS [ 6383.742449] test_bpf: #997 Staggered jumps: JMP_JGE_X jited:1 102356 PASS [ 6383.753997] test_bpf: #998 Staggered jumps: JMP_JLT_X jited:1 101709 PASS [ 6383.765515] test_bpf: #999 Staggered jumps: JMP_JLE_X jited:1 91910 PASS [ 6383.777409] test_bpf: #1000 Staggered jumps: JMP_JSGT_X jited:1 84651 PASS [ 6383.788867] test_bpf: #1001 Staggered jumps: JMP_JSGE_X jited:1 111683 PASS [ 6383.800942] test_bpf: #1002 Staggered jumps: JMP_JSLT_X jited:1 104059 PASS [ 6383.812556] test_bpf: #1003 Staggered jumps: JMP_JSLE_X jited:1 101705 PASS [ 6383.824074] test_bpf: #1004 Staggered jumps: JMP32_JEQ_K jited:1 108097 PASS [ 6383.835198] test_bpf: #1005 Staggered jumps: JMP32_JNE_K jited:1 111084 PASS [ 6383.846348] test_bpf: #1006 Staggered jumps: JMP32_JSET_K jited:1 106459 PASS [ 6383.857335] test_bpf: #1007 Staggered jumps: JMP32_JGT_K jited:1 107181 PASS [ 6383.868480] test_bpf: #1008 Staggered jumps: JMP32_JGE_K jited:1 106301 PASS [ 6383.879527] test_bpf: #1009 Staggered jumps: JMP32_JLT_K jited:1 100112 PASS [ 6383.890503] test_bpf: #1010 Staggered jumps: JMP32_JLE_K jited:1 106557 PASS [ 6383.901615] test_bpf: #1011 Staggered jumps: JMP32_JSGT_K jited:1 103473 PASS [ 6383.912421] test_bpf: #1012 Staggered jumps: JMP32_JSGE_K jited:1 95558 PASS [ 6383.923319] test_bpf: #1013 Staggered jumps: JMP32_JSLT_K jited:1 85998 PASS [ 6383.934093] test_bpf: #1014 Staggered jumps: JMP32_JSLE_K jited:1 107484 PASS [ 6383.945048] test_bpf: #1015 Staggered jumps: JMP32_JEQ_X jited:1 95288 PASS [ 6383.956459] test_bpf: #1016 Staggered jumps: JMP32_JNE_X jited:1 100119 PASS [ 6383.967745] test_bpf: #1017 Staggered jumps: JMP32_JSET_X jited:1 91207 PASS [ 6383.978914] test_bpf: #1018 Staggered jumps: JMP32_JGT_X jited:1 92501 PASS [ 6383.990114] test_bpf: #1019 Staggered jumps: JMP32_JGE_X jited:1 91498 PASS [ 6384.001163] test_bpf: #1020 Staggered jumps: JMP32_JLT_X jited:1 75734 PASS [ 6384.011930] test_bpf: #1021 Staggered jumps: JMP32_JLE_X jited:1 96642 PASS [ 6384.023107] test_bpf: #1022 Staggered jumps: JMP32_JSGT_X jited:1 82304 PASS [ 6384.034282] test_bpf: #1023 Staggered jumps: JMP32_JSGE_X jited:1 91578 PASS [ 6384.045442] test_bpf: #1024 Staggered jumps: JMP32_JSLT_X jited:1 96739 PASS [ 6384.056633] test_bpf: #1025 Staggered jumps: JMP32_JSLE_X jited:1 96174 PASS [ 6384.067873] test_bpf: Summary: 1026 PASSED, 0 FAILED, [1014/1014 JIT'ed] [ 6384.070154] test_bpf: #0 Tail call leaf jited:1 36 PASS [ 6384.070206] test_bpf: #1 Tail call 2 jited:1 41 PASS [ 6384.071025] test_bpf: #2 Tail call 3 jited:1 56 PASS [ 6384.071799] test_bpf: #3 Tail call 4 jited:1 94 PASS [ 6384.072603] test_bpf: #4 Tail call load/store leaf jited:1 27 PASS [ 6384.073321] test_bpf: #5 Tail call load/store jited:1 44 PASS [ 6384.074249] test_bpf: #6 Tail call error path, max count reached jited:1 548 PASS [ 6384.075611] test_bpf: #7 Tail call count preserved across function calls jited:1 52474 PASS [ 6384.129132] test_bpf: #8 Tail call error path, NULL target jited:1 29 PASS [ 6384.130325] test_bpf: #9 Tail call error path, index out of range jited:1 27 PASS [ 6384.131300] test_bpf: test_tail_calls: Summary: 10 PASSED, 0 FAILED, [10/10 JIT'ed] [ 6384.133835] test_bpf: #0 gso_with_rx_frags PASS [ 6384.134606] test_bpf: #1 gso_linear_no_head_frag PASS [ 6384.136431] test_bpf: test_skb_segment: Summary: 2 PASSED, 0 FAILED [-- MARK -- Thu Feb 2 19:55:00 2023] [ 6403.044242] u32 classifier [ 6403.049936] Performance counters on [ 6403.050492] input device check on [ 6403.051005] Actions configured [ 6403.219012] gre: GRE over IPv4 demultiplexor driver [ 6403.234712] ip_gre: GRE over IPv4 tunneling driver [ 6403.841214] ip6_gre: GRE over IPv6 tunneling driver [ 6403.918262] ip6_tunnel: ip6gretap00 xmit: Local address not yet configured! [ 6404.422889] ip6_tunnel: ip6erspan00 xmit: Local address not yet configured! [ 6404.510137] ip6_tunnel: ip6erspan00 xmit: Local address not yet configured! [ 6404.745160] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. [ 6404.778885] test-br0: port 1(test-dummy0) entered blocking state [ 6404.779977] test-br0: port 1(test-dummy0) entered disabled state [ 6404.783557] device test-dummy0 entered promiscuous mode [ 6404.799833] test-br0: port 1(test-dummy0) entered blocking state [ 6404.800847] test-br0: port 1(test-dummy0) entered forwarding state [ 6404.878414] 8021q: 802.1Q VLAN Support v1.8 [ 6404.879340] 8021q: adding VLAN 0 to HW filter on device ens3 [ 6405.147199] device test-dummy0 left promiscuous mode [ 6405.148103] test-br0: port 1(test-dummy0) entered disabled state [ 6419.616560] MACsec IEEE 802.1AE [ 6420.152958] alg: No test for seqiv(rfc4106(gcm(aes))) (seqiv(rfc4106-gcm-aesni)) [ 6420.624317] netdevsim netdevsim0 eni0np1: renamed from eth0 [ 6422.190288] test-br0: port 1(vxlan10) entered blocking state [ 6422.191572] test-br0: port 1(vxlan10) entered disabled state [ 6422.193102] device vxlan10 entered promiscuous mode [ 6422.376600] device vxlan10 left promiscuous mode [ 6422.377509] test-br0: port 1(vxlan10) entered disabled state [ 6422.620251] netdevsim netdevsim10 eni10np1: renamed from eth0 [ 6422.649794] netdevsim netdevsim20 eni20np1: renamed from eth1 [ 6422.872767] test-bond0: (slave eni10np1): Enslaving as a backup interface with an up link [ 6422.890354] test-bond0: (slave eni20np1): Enslaving as a backup interface with an up link [ 6422.931531] test-br0: port 1(test-bond0) entered blocking state [ 6422.932668] test-br0: port 1(test-bond0) entered disabled state [ 6422.935765] device test-bond0 entered promiscuous mode [ 6422.936953] device eni10np1 entered promiscuous mode [ 6422.938005] device eni20np1 entered promiscuous mode [ 6422.958014] device test-bond0 left promiscuous mode [ 6422.959090] device eni10np1 left promiscuous mode [ 6422.960136] device eni20np1 left promiscuous mode [ 6422.961366] test-br0: port 1(test-bond0) entered disabled state [ 6423.001398] test-bond0 (unregistering): (slave eni10np1): Releasing backup interface [ 6423.007689] test-bond0 (unregistering): (slave eni20np1): Releasing backup interface [ 6423.011087] test-bond0 (unregistering): Released all slaves [ 6426.181257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 6426.229334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 6426.247658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 6426.778815] Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled [ 6426.970601] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 6427.008973] alg: No test for echainiv(authenc(hmac(sha1),cbc(aes))) (echainiv(authenc(hmac(sha1-avx2),cbc-aes-aesni))) [-- MARK -- Thu Feb 2 20:00:00 2023] [ 6699.478515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 6699.488874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 6713.607822] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 6713.618555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 6713.644931] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 6714.899459] IPv6: Can't replace route, no match found [ 6715.476981] IPv6: Can't replace route, no match found [ 6716.106686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 6716.132316] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 6718.781138] IPv6: ADDRCONF(NETDEV_CHANGE): veth-inside: link becomes ready [ 6718.782431] IPv6: ADDRCONF(NETDEV_CHANGE): veth-outside: link becomes ready [ 6721.689997] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 6721.711325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 6721.735519] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 6727.960016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 6728.015553] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 6729.010454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 6729.032884] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 6732.022918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 6732.209526] Mirror/redirect action on [ 6734.088933] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 6734.090607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 6734.117267] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 6738.880835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 6738.903592] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 6745.866409] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 6745.888332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 6745.936001] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 6745.990586] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 6746.042110] IPv6: ADDRCONF(NETDEV_CHANGE): veth7: link becomes ready [ 6749.459243] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6749.570055] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6749.671965] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6749.803887] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6750.464185] IPv6: ADDRCONF(NETDEV_CHANGE): veth_R1-A: link becomes ready [ 6751.461873] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6751.557722] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6751.649361] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6751.741855] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6753.604934] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6753.692294] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6753.782576] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6753.886391] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6755.373095] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6755.470249] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6755.577202] IPv6: ADDRCONF(NETDEV_CHANGE): veth_R1-B: link becomes ready [ 6755.579708] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6755.688685] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6757.105090] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6757.199275] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6757.292761] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6757.418256] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6759.795028] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6759.906658] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6760.006898] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6760.122442] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6762.417879] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6762.509186] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6762.598985] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6762.688719] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6764.360969] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6764.453645] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6764.542339] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6764.639503] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6766.552475] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6766.659279] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6766.764883] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6766.876989] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6769.178994] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6769.269280] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6769.363760] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6769.457573] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6771.867168] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6771.959762] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6772.051443] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6772.144440] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6774.344399] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6774.435431] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6774.531868] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6774.617150] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6776.938632] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6777.045676] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6777.145083] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6777.280249] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6779.653233] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6779.743441] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6779.830044] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6779.922772] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6782.301136] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6782.407236] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6782.515781] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6782.636663] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6785.045069] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6785.142384] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6785.251660] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6785.359420] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6787.917858] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6788.024955] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6788.137984] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6788.245886] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6790.637787] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6790.746968] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6790.851364] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6790.964900] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6793.392817] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6793.493693] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6793.596450] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6793.710765] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6796.114157] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6796.229849] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6796.332398] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6796.437404] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6798.926865] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6799.049263] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6799.165427] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6799.284626] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6801.649289] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6801.759787] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6801.871945] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6801.981397] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6804.549427] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6804.661922] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6804.773272] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6804.890379] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6807.286751] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6807.415576] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6807.559431] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6807.680529] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6810.340840] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6810.454794] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6810.572853] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6810.706171] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6811.112700] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6811.210773] br0: port 1(veth_A-C) entered blocking state [ 6811.211632] br0: port 1(veth_A-C) entered disabled state [ 6811.213923] device veth_A-C entered promiscuous mode [ 6811.215682] br0: port 1(veth_A-C) entered blocking state [ 6811.216518] br0: port 1(veth_A-C) entered forwarding state [ 6811.386461] br0: port 2(vxlan_a) entered blocking state [ 6811.387420] br0: port 2(vxlan_a) entered disabled state [ 6811.392007] device vxlan_a entered promiscuous mode [ 6811.482000] br0: port 2(vxlan_a) entered blocking state [ 6811.482852] br0: port 2(vxlan_a) entered forwarding state [ 6814.040320] device vxlan_a left promiscuous mode [ 6814.041291] br0: port 2(vxlan_a) entered disabled state [ 6814.051399] device veth_A-C left promiscuous mode [ 6814.052435] br0: port 1(veth_A-C) entered disabled state [ 6814.744866] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6814.873645] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6815.002309] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6815.134930] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6815.757746] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6815.885835] br0: port 1(veth_A-C) entered blocking state [ 6815.886824] br0: port 1(veth_A-C) entered disabled state [ 6815.888463] device veth_A-C entered promiscuous mode [ 6815.890407] br0: port 1(veth_A-C) entered blocking state [ 6815.891280] br0: port 1(veth_A-C) entered forwarding state [ 6816.102511] br0: port 2(vxlan_a) entered blocking state [ 6816.103923] br0: port 2(vxlan_a) entered disabled state [ 6816.106345] device vxlan_a entered promiscuous mode [ 6816.130964] IPv6: ADDRCONF(NETDEV_CHANGE): veth_R2-B: link becomes ready [ 6816.205832] br0: port 2(vxlan_a) entered blocking state [ 6816.207098] br0: port 2(vxlan_a) entered forwarding state [ 6818.811966] device vxlan_a left promiscuous mode [ 6818.813006] br0: port 2(vxlan_a) entered disabled state [ 6818.823683] device veth_A-C left promiscuous mode [ 6818.825386] br0: port 1(veth_A-C) entered disabled state [ 6819.579361] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6819.705176] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6819.862110] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6820.003709] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6820.505288] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6820.619025] br0: port 1(veth_A-C) entered blocking state [ 6820.620198] br0: port 1(veth_A-C) entered disabled state [ 6820.622215] device veth_A-C entered promiscuous mode [ 6820.624005] br0: port 1(veth_A-C) entered blocking state [ 6820.625112] br0: port 1(veth_A-C) entered forwarding state [ 6820.834551] br0: port 2(vxlan_a) entered blocking state [ 6820.835552] br0: port 2(vxlan_a) entered disabled state [ 6820.840605] device vxlan_a entered promiscuous mode [ 6820.966701] br0: port 2(vxlan_a) entered blocking state [ 6820.967749] br0: port 2(vxlan_a) entered forwarding state [ 6823.564474] device vxlan_a left promiscuous mode [ 6823.568412] br0: port 2(vxlan_a) entered disabled state [ 6823.577615] device veth_A-C left promiscuous mode [ 6823.578791] br0: port 1(veth_A-C) entered disabled state [ 6824.181817] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6824.285423] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6824.394523] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6824.516481] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6825.121798] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6825.216107] br0: port 1(veth_A-C) entered blocking state [ 6825.216945] br0: port 1(veth_A-C) entered disabled state [ 6825.218432] device veth_A-C entered promiscuous mode [ 6825.220500] br0: port 1(veth_A-C) entered blocking state [ 6825.221390] br0: port 1(veth_A-C) entered forwarding state [ 6825.381490] br0: port 2(vxlan_a) entered blocking state [ 6825.382394] br0: port 2(vxlan_a) entered disabled state [ 6825.385402] device vxlan_a entered promiscuous mode [ 6825.484593] br0: port 2(vxlan_a) entered blocking state [ 6825.485437] br0: port 2(vxlan_a) entered forwarding state [ 6828.093558] device vxlan_a left promiscuous mode [ 6828.095301] br0: port 2(vxlan_a) entered disabled state [ 6828.107056] device veth_A-C left promiscuous mode [ 6828.108174] br0: port 1(veth_A-C) entered disabled state [ 6828.904538] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6829.036025] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6829.172466] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6829.307842] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6829.812449] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6829.951695] br0: port 1(veth_A-C) entered blocking state [ 6829.952628] br0: port 1(veth_A-C) entered disabled state [ 6829.954588] device veth_A-C entered promiscuous mode [ 6829.956346] br0: port 1(veth_A-C) entered blocking state [ 6829.957272] br0: port 1(veth_A-C) entered forwarding state [ 6830.120102] br0: port 2(vxlan_a) entered blocking state [ 6830.121070] br0: port 2(vxlan_a) entered disabled state [ 6830.123184] device vxlan_a entered promiscuous mode [ 6830.240053] br0: port 2(vxlan_a) entered blocking state [ 6830.240910] br0: port 2(vxlan_a) entered forwarding state [ 6832.870028] device vxlan_a left promiscuous mode [ 6832.871282] br0: port 2(vxlan_a) entered disabled state [ 6832.885264] device veth_A-C left promiscuous mode [ 6832.886524] br0: port 1(veth_A-C) entered disabled state [ 6833.559804] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6833.704620] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6833.844199] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6833.976605] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6834.586079] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6834.693209] br0: port 1(veth_A-C) entered blocking state [ 6834.694199] br0: port 1(veth_A-C) entered disabled state [ 6834.695826] device veth_A-C entered promiscuous mode [ 6834.697672] br0: port 1(veth_A-C) entered blocking state [ 6834.698618] br0: port 1(veth_A-C) entered forwarding state [ 6834.873036] br0: port 2(vxlan_a) entered blocking state [ 6834.874358] br0: port 2(vxlan_a) entered disabled state [ 6834.876936] device vxlan_a entered promiscuous mode [ 6834.961347] IPv6: ADDRCONF(NETDEV_CHANGE): veth_R2-B: link becomes ready [ 6834.995884] br0: port 2(vxlan_a) entered blocking state [ 6834.996864] br0: port 2(vxlan_a) entered forwarding state [ 6837.611588] device vxlan_a left promiscuous mode [ 6837.613226] br0: port 2(vxlan_a) entered disabled state [ 6837.623896] device veth_A-C left promiscuous mode [ 6837.625469] br0: port 1(veth_A-C) entered disabled state [ 6838.446008] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6838.600138] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6838.762546] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6838.886027] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6839.346039] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6839.463143] br0: port 1(veth_A-C) entered blocking state [ 6839.464619] br0: port 1(veth_A-C) entered disabled state [ 6839.466788] device veth_A-C entered promiscuous mode [ 6839.469139] br0: port 1(veth_A-C) entered blocking state [ 6839.470539] br0: port 1(veth_A-C) entered forwarding state [ 6839.658991] br0: port 2(vxlan_a) entered blocking state [ 6839.660445] br0: port 2(vxlan_a) entered disabled state [ 6839.662530] device vxlan_a entered promiscuous mode [ 6839.782466] br0: port 2(vxlan_a) entered blocking state [ 6839.783913] br0: port 2(vxlan_a) entered forwarding state [ 6842.413117] device vxlan_a left promiscuous mode [ 6842.414015] br0: port 2(vxlan_a) entered disabled state [ 6842.428332] device veth_A-C left promiscuous mode [ 6842.429248] br0: port 1(veth_A-C) entered disabled state [ 6843.162710] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6843.301349] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6843.440157] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6843.583812] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6844.224902] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6844.334359] br0: port 1(veth_A-C) entered blocking state [ 6844.335629] br0: port 1(veth_A-C) entered disabled state [ 6844.338217] device veth_A-C entered promiscuous mode [ 6844.340248] br0: port 1(veth_A-C) entered blocking state [ 6844.341554] br0: port 1(veth_A-C) entered forwarding state [ 6844.518299] br0: port 2(vxlan_a) entered blocking state [ 6844.525253] br0: port 2(vxlan_a) entered disabled state [ 6844.526821] device vxlan_a entered promiscuous mode [ 6844.619126] br0: port 2(vxlan_a) entered blocking state [ 6844.620008] br0: port 2(vxlan_a) entered forwarding state [ 6847.162617] device vxlan_a left promiscuous mode [ 6847.163471] br0: port 2(vxlan_a) entered disabled state [ 6847.172564] device veth_A-C left promiscuous mode [ 6847.173451] br0: port 1(veth_A-C) entered disabled state [ 6847.930375] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6848.059767] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6848.199646] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6848.342070] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6848.818906] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6848.942505] br0: port 1(veth_A-C) entered blocking state [ 6848.944090] br0: port 1(veth_A-C) entered disabled state [ 6848.946299] device veth_A-C entered promiscuous mode [ 6848.948007] br0: port 1(veth_A-C) entered blocking state [ 6848.948841] br0: port 1(veth_A-C) entered forwarding state [ 6849.111355] br0: port 2(geneve_a) entered blocking state [ 6849.112253] br0: port 2(geneve_a) entered disabled state [ 6849.116067] device geneve_a entered promiscuous mode [ 6849.213905] br0: port 2(geneve_a) entered blocking state [ 6849.214784] br0: port 2(geneve_a) entered forwarding state [ 6851.767232] device geneve_a left promiscuous mode [ 6851.768113] br0: port 2(geneve_a) entered disabled state [ 6851.778736] device veth_A-C left promiscuous mode [ 6851.779675] br0: port 1(veth_A-C) entered disabled state [ 6852.479164] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6852.625878] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6852.779604] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6852.891025] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6853.501059] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6853.594106] br0: port 1(veth_A-C) entered blocking state [ 6853.595199] br0: port 1(veth_A-C) entered disabled state [ 6853.597008] device veth_A-C entered promiscuous mode [ 6853.598823] br0: port 1(veth_A-C) entered blocking state [ 6853.599628] br0: port 1(veth_A-C) entered forwarding state [ 6853.746147] br0: port 2(geneve_a) entered blocking state [ 6853.747338] br0: port 2(geneve_a) entered disabled state [ 6853.749576] device geneve_a entered promiscuous mode [ 6853.855085] br0: port 2(geneve_a) entered blocking state [ 6853.855963] br0: port 2(geneve_a) entered forwarding state [ 6856.467871] device geneve_a left promiscuous mode [ 6856.469165] br0: port 2(geneve_a) entered disabled state [ 6856.475923] device veth_A-C left promiscuous mode [ 6856.477055] br0: port 1(veth_A-C) entered disabled state [ 6857.118760] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6857.238027] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6857.370120] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6857.518867] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6857.973618] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6858.095819] br0: port 1(veth_A-C) entered blocking state [ 6858.097430] br0: port 1(veth_A-C) entered disabled state [ 6858.099802] device veth_A-C entered promiscuous mode [ 6858.102146] br0: port 1(veth_A-C) entered blocking state [ 6858.103298] br0: port 1(veth_A-C) entered forwarding state [ 6858.281313] br0: port 2(geneve_a) entered blocking state [ 6858.282225] br0: port 2(geneve_a) entered disabled state [ 6858.283689] device geneve_a entered promiscuous mode [ 6858.390729] br0: port 2(geneve_a) entered blocking state [ 6858.392202] br0: port 2(geneve_a) entered forwarding state [ 6860.984403] device geneve_a left promiscuous mode [ 6860.985473] br0: port 2(geneve_a) entered disabled state [ 6860.993118] device veth_A-C left promiscuous mode [ 6860.993980] br0: port 1(veth_A-C) entered disabled state [ 6861.579250] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6861.681832] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6861.791920] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6861.919313] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6862.518182] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6862.622585] br0: port 1(veth_A-C) entered blocking state [ 6862.623500] br0: port 1(veth_A-C) entered disabled state [ 6862.625403] device veth_A-C entered promiscuous mode [ 6862.626987] br0: port 1(veth_A-C) entered blocking state [ 6862.627893] br0: port 1(veth_A-C) entered forwarding state [ 6862.809572] br0: port 2(geneve_a) entered blocking state [ 6862.810809] br0: port 2(geneve_a) entered disabled state [ 6862.812717] device geneve_a entered promiscuous mode [ 6862.910463] br0: port 2(geneve_a) entered blocking state [ 6862.911465] br0: port 2(geneve_a) entered forwarding state [ 6865.505988] device geneve_a left promiscuous mode [ 6865.507420] br0: port 2(geneve_a) entered disabled state [ 6865.515009] device veth_A-C left promiscuous mode [ 6865.515974] br0: port 1(veth_A-C) entered disabled state [ 6866.189095] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6866.305206] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6866.428024] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6866.528564] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6866.953376] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6867.051111] br0: port 1(veth_A-C) entered blocking state [ 6867.052003] br0: port 1(veth_A-C) entered disabled state [ 6867.053883] device veth_A-C entered promiscuous mode [ 6867.056081] br0: port 1(veth_A-C) entered blocking state [ 6867.056961] br0: port 1(veth_A-C) entered forwarding state [ 6867.204457] br0: port 2(geneve_a) entered blocking state [ 6867.205538] br0: port 2(geneve_a) entered disabled state [ 6867.207356] device geneve_a entered promiscuous mode [ 6867.294793] br0: port 2(geneve_a) entered blocking state [ 6867.305342] br0: port 2(geneve_a) entered forwarding state [ 6869.861774] device geneve_a left promiscuous mode [ 6869.862961] br0: port 2(geneve_a) entered disabled state [ 6869.873668] device veth_A-C left promiscuous mode [ 6869.874803] br0: port 1(veth_A-C) entered disabled state [ 6870.655440] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6870.820477] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6870.987163] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6871.145142] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6871.771464] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6871.879259] br0: port 1(veth_A-C) entered blocking state [ 6871.880392] br0: port 1(veth_A-C) entered disabled state [ 6871.883082] device veth_A-C entered promiscuous mode [ 6871.885122] br0: port 1(veth_A-C) entered blocking state [ 6871.886100] br0: port 1(veth_A-C) entered forwarding state [ 6872.053142] br0: port 2(geneve_a) entered blocking state [ 6872.054189] br0: port 2(geneve_a) entered disabled state [ 6872.056606] device geneve_a entered promiscuous mode [ 6872.144384] br0: port 2(geneve_a) entered blocking state [ 6872.145230] br0: port 2(geneve_a) entered forwarding state [ 6874.717341] device geneve_a left promiscuous mode [ 6874.718255] br0: port 2(geneve_a) entered disabled state [ 6874.724133] device veth_A-C left promiscuous mode [ 6874.725005] br0: port 1(veth_A-C) entered disabled state [ 6875.408497] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6875.554761] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6875.662731] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6875.782608] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6876.220225] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6876.316985] br0: port 1(veth_A-C) entered blocking state [ 6876.317827] br0: port 1(veth_A-C) entered disabled state [ 6876.319455] device veth_A-C entered promiscuous mode [ 6876.322136] br0: port 1(veth_A-C) entered blocking state [ 6876.322969] br0: port 1(veth_A-C) entered forwarding state [ 6876.468536] br0: port 2(geneve_a) entered blocking state [ 6876.469984] br0: port 2(geneve_a) entered disabled state [ 6876.472236] device geneve_a entered promiscuous mode [ 6876.563748] br0: port 2(geneve_a) entered blocking state [ 6876.564626] br0: port 2(geneve_a) entered forwarding state [ 6876.790299] IPv6: ADDRCONF(NETDEV_CHANGE): veth_R2-B: link becomes ready [ 6879.121055] device geneve_a left promiscuous mode [ 6879.152588] br0: port 2(geneve_a) entered disabled state [ 6879.175377] device veth_A-C left promiscuous mode [ 6879.176608] br0: port 1(veth_A-C) entered disabled state [ 6879.795217] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6879.909570] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6880.023072] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6880.138134] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6880.707096] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-C: link becomes ready [ 6880.813542] br0: port 1(veth_A-C) entered blocking state [ 6880.814731] br0: port 1(veth_A-C) entered disabled state [ 6880.816633] device veth_A-C entered promiscuous mode [ 6880.819108] br0: port 1(veth_A-C) entered blocking state [ 6880.820245] br0: port 1(veth_A-C) entered forwarding state [ 6880.980831] br0: port 2(geneve_a) entered blocking state [ 6880.981965] br0: port 2(geneve_a) entered disabled state [ 6880.984991] device geneve_a entered promiscuous mode [ 6881.080493] br0: port 2(geneve_a) entered blocking state [ 6881.081949] br0: port 2(geneve_a) entered forwarding state [ 6883.623808] device geneve_a left promiscuous mode [ 6883.625125] br0: port 2(geneve_a) entered disabled state [ 6883.633226] device veth_A-C left promiscuous mode [ 6883.634573] br0: port 1(veth_A-C) entered disabled state [ 6884.216332] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6884.322090] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6884.428898] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6884.525441] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6885.386902] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6885.501378] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6885.638098] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6885.761986] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6886.623058] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6886.730560] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6886.845481] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6886.975837] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6887.985239] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6888.103592] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6888.244501] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6888.358523] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6889.320431] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6889.437210] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6889.556224] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6889.679070] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6890.634635] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6890.753890] IPv6: ADDRCONF(NETDEV_CHANGE): veth_R2-A: link becomes ready [ 6890.755209] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6890.870466] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6891.010657] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6892.019092] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6892.153533] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6892.291855] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6892.421830] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6893.296907] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6893.402700] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6893.527295] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6893.652228] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6894.522880] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6894.648332] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6894.756879] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6894.864393] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6895.213516] ipip: IPv4 and MPLS over IPv4 tunneling driver [ 6897.431769] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6897.540032] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6897.634659] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6897.779382] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6900.395166] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6900.494911] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6900.590163] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6900.712153] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6900.977497] sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver [ 6903.063188] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6903.185311] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6903.305668] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6903.424332] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6905.872891] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6905.994559] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6906.120031] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6906.222412] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6908.649432] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6908.775369] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6908.893515] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6909.003730] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6911.485342] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6911.606136] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6911.724990] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6911.854751] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6914.227698] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6914.332801] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6914.442622] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6914.555087] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6917.154247] IPv6: ADDRCONF(NETDEV_CHANGE): veth_a: link becomes ready [ 6920.040215] IPv6: ADDRCONF(NETDEV_CHANGE): veth_a: link becomes ready [ 6920.107731] IPv4 over IPsec tunneling driver [ 6923.705863] IPv6: ADDRCONF(NETDEV_CHANGE): veth_a: link becomes ready [ 6926.469371] IPv6: ADDRCONF(NETDEV_CHANGE): veth_a: link becomes ready [ 6930.047788] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6930.193955] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6930.316314] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6930.440997] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6934.229430] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6934.333747] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6934.442018] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6934.553828] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6938.352337] IPv6: ADDRCONF(NETDEV_CHANGE): veth_a: link becomes ready [ 6939.520580] IPv6: ADDRCONF(NETDEV_CHANGE): veth_a: link becomes ready [ 6943.750642] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6943.867130] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6943.972860] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6944.077180] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6944.752569] IPv6: ADDRCONF(NETDEV_CHANGE): veth_R1-A: link becomes ready [ 6948.662111] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6948.766154] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6948.908822] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6949.023815] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6953.818534] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6953.933066] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6954.048868] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6954.141721] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6958.845106] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6958.981507] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6959.125742] IPv6: ADDRCONF(NETDEV_CHANGE): veth_R1-B: link becomes ready [ 6959.127176] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6959.253750] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6963.976277] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6964.103556] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6964.227854] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6964.343868] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 6965.358884] IPv6: ADDRCONF(NETDEV_CHANGE): veth_R2-B: link becomes ready [-- MARK -- Thu Feb 2 20:05:00 2023] [ 6993.343392] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 6993.476034] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 6993.599323] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 6993.698491] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 7022.462686] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 7022.571481] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 7022.673489] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 7022.792083] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 7030.626816] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 7030.735558] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 7030.872368] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 7031.001133] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 7039.083856] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 7039.197746] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 7039.303418] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 7039.427047] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 7040.711764] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 7040.807001] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 7040.902093] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 7041.000606] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 7042.396017] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 7042.492742] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 7042.596318] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 7042.700380] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 7044.043465] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R1: link becomes ready [ 7044.196544] IPv6: ADDRCONF(NETDEV_CHANGE): veth_A-R2: link becomes ready [ 7044.307745] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R1: link becomes ready [ 7044.432956] IPv6: ADDRCONF(NETDEV_CHANGE): veth_B-R2: link becomes ready [ 7137.297170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7138.272946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7141.367434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7151.772342] IPv4: Oversized IP packet from 172.17.0.2 [ 7154.329830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 7154.331933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7158.931405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7163.483569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7168.104386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7172.654731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7177.213105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7184.143483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 7184.144766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7184.715002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7185.284363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7185.925554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7186.501959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7187.036624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7187.648264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7188.477406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 7188.479591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7189.220973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7189.825158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7190.400209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7191.041161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7191.694487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7192.306074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7192.895478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7193.549091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7196.486295] veth0: renamed from veth-hv-1 [ 7196.666102] br0: port 1(vxlan0) entered blocking state [ 7196.666938] br0: port 1(vxlan0) entered disabled state [ 7196.671711] device vxlan0 entered promiscuous mode [ 7196.691834] br0: port 1(vxlan0) entered blocking state [ 7196.692826] br0: port 1(vxlan0) entered forwarding state [ 7196.769808] veth0: renamed from veth-hv-2 [ 7196.846534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7196.848282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7196.930273] br0: port 1(vxlan0) entered blocking state [ 7196.931127] br0: port 1(vxlan0) entered disabled state [ 7196.932645] device vxlan0 entered promiscuous mode [ 7196.949190] br0: port 1(vxlan0) entered blocking state [ 7196.949990] br0: port 1(vxlan0) entered forwarding state [ 7197.136765] br0: port 2(veth-tap) entered blocking state [ 7197.137985] br0: port 2(veth-tap) entered disabled state [ 7197.147672] device veth-tap entered promiscuous mode [ 7197.167944] br0: port 2(veth-tap) entered blocking state [ 7197.168960] br0: port 2(veth-tap) entered forwarding state [ 7197.249602] IPv6: ADDRCONF(NETDEV_CHANGE): veth-tap: link becomes ready [ 7197.386281] br0: port 2(veth-tap) entered blocking state [ 7197.395497] br0: port 2(veth-tap) entered disabled state [ 7197.399765] device veth-tap entered promiscuous mode [ 7197.514815] IPv6: ADDRCONF(NETDEV_CHANGE): veth-hv: link becomes ready [ 7197.516272] IPv6: ADDRCONF(NETDEV_CHANGE): veth-tap: link becomes ready [ 7197.517516] br0: port 2(veth-tap) entered blocking state [ 7197.518410] br0: port 2(veth-tap) entered forwarding state [ 7197.645287] br0: port 1(vxlan0) entered disabled state [ 7197.667376] br0: port 1(vxlan0) entered blocking state [ 7197.668515] br0: port 1(vxlan0) entered forwarding state [ 7197.726481] br0: port 1(vxlan0) entered disabled state [ 7197.746997] br0: port 1(vxlan0) entered blocking state [ 7197.748006] br0: port 1(vxlan0) entered forwarding state [ 7198.026754] device veth-tap left promiscuous mode [ 7198.028290] br0: port 2(veth-tap) entered disabled state [ 7198.040279] device vxlan0 left promiscuous mode [ 7198.041295] br0: port 1(vxlan0) entered disabled state [ 7198.120920] br0: port 1(vxlan0) entered disabled state [ 7198.123376] device vxlan0 left promiscuous mode [ 7198.124273] br0: port 1(vxlan0) entered disabled state [ 7198.436674] device veth-tap left promiscuous mode [ 7198.437624] br0: port 2(veth-tap) entered disabled state [ 7204.836769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 7205.851559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [-- MARK -- Thu Feb 2 20:10:00 2023] [ 7390.808531] eth1: renamed from tmp [ 7390.862099] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 7390.863812] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 7437.461976] eth1: renamed from tmp [ 7437.491496] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 7484.205196] eth1: renamed from tmp [ 7484.235931] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 7536.492716] eth1: renamed from tmp [ 7536.525235] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [-- MARK -- Thu Feb 2 20:16:03 2023] [ 7625.634679] TCP: MD5 Hash failed for (172.16.1.2, 37544)->(172.16.1.1, 12345) L3 index 0 [ 7626.681501] TCP: MD5 Hash failed for (172.16.1.2, 37544)->(172.16.1.1, 12345) L3 index 0 [ 7628.729320] TCP: MD5 Hash failed for (172.16.1.2, 37544)->(172.16.1.1, 12345) L3 index 0 [ 7645.045653] TCP: MD5 Hash failed for (172.16.1.2, 56304)->(172.16.1.1, 12345) L3 index 0 [ 7646.072075] TCP: MD5 Hash failed for (172.16.1.2, 56304)->(172.16.1.1, 12345) L3 index 0 [ 7648.119739] TCP: MD5 Hash failed for (172.16.1.2, 56304)->(172.16.1.1, 12345) L3 index 0 [ 7747.175297] TCP: MD5 Hash failed for (172.16.1.2, 58580)->(172.16.1.1, 12345) L3 index 0 [ 7748.207775] TCP: MD5 Hash failed for (172.16.1.2, 58580)->(172.16.1.1, 12345) L3 index 0 [ 7750.255466] TCP: MD5 Hash failed for (172.16.1.2, 58580)->(172.16.1.1, 12345) L3 index 0 [ 7766.602735] TCP: MD5 Hash failed for (172.16.1.2, 37314)->(172.16.1.1, 12345) L3 index 0 [ 7767.662221] TCP: MD5 Hash failed for (172.16.1.2, 37314)->(172.16.1.1, 12345) L3 index 0 [ 7769.710003] TCP: MD5 Hash failed for (172.16.1.2, 37314)->(172.16.1.1, 12345) L3 index 0 [ 7782.586893] eth1: renamed from tmp [ 7782.620366] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 7810.509171] eth2: renamed from tmp [ 7810.538176] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready [ 7810.540256] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready [ 7823.930993] TCP: MD5 Hash failed for (172.16.1.2, 46002)->(172.16.1.1, 12345) L3 index 13 [ 7824.937418] TCP: MD5 Hash failed for (172.16.1.2, 46002)->(172.16.1.1, 12345) L3 index 13 [ 7826.985391] TCP: MD5 Hash failed for (172.16.1.2, 46002)->(172.16.1.1, 12345) L3 index 13 [ 7843.344005] TCP: MD5 Hash failed for (172.16.1.2, 34006)->(172.16.1.1, 12345) L3 index 13 [ 7844.391861] TCP: MD5 Hash failed for (172.16.1.2, 34006)->(172.16.1.1, 12345) L3 index 13 [ 7846.439732] TCP: MD5 Hash failed for (172.16.1.2, 34006)->(172.16.1.1, 12345) L3 index 13 [ 7865.920439] TCP: MD5 Hash failed for (172.16.1.2, 40824)->(172.16.1.1, 12345) L3 index 0 [ 7866.982038] TCP: MD5 Hash failed for (172.16.1.2, 40824)->(172.16.1.1, 12345) L3 index 0 [ 7869.029891] TCP: MD5 Hash failed for (172.16.1.2, 40824)->(172.16.1.1, 12345) L3 index 0 [ 7874.092402] TCP: MD5 Hash failed for (172.16.1.2, 34802)->(172.16.1.1, 12345) L3 index 13 [ 7875.109483] TCP: MD5 Hash failed for (172.16.1.2, 34802)->(172.16.1.1, 12345) L3 index 13 [ 7877.157254] TCP: MD5 Hash failed for (172.16.1.2, 34802)->(172.16.1.1, 12345) L3 index 13 [-- MARK -- Thu Feb 2 20:20:00 2023] [ 7888.543950] TCP: MD5 Hash failed for (172.16.1.2, 40930)->(172.16.1.1, 12345) L3 index 0 [ 7889.572148] TCP: MD5 Hash failed for (172.16.1.2, 40930)->(172.16.1.1, 12345) L3 index 0 [ 7891.620160] TCP: MD5 Hash failed for (172.16.1.2, 40930)->(172.16.1.1, 12345) L3 index 0 [ 7896.700843] TCP: MD5 Hash failed for (172.16.1.2, 38410)->(172.16.1.1, 12345) L3 index 13 [ 7897.763548] TCP: MD5 Hash failed for (172.16.1.2, 38410)->(172.16.1.1, 12345) L3 index 13 [ 7899.811424] TCP: MD5 Hash failed for (172.16.1.2, 38410)->(172.16.1.1, 12345) L3 index 13 [ 8007.115919] eth1: renamed from tmp [ 8007.144658] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [-- MARK -- Thu Feb 2 20:25:00 2023] [ 8264.672802] eth1: renamed from tmp [ 8264.707444] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8378.613527] eth1: renamed from tmp [ 8378.641764] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8394.489313] eth1: renamed from tmp [ 8394.517654] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8425.431849] eth1: renamed from tmp [ 8425.457015] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8435.006025] eth1: renamed from tmp [ 8435.032797] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8444.576442] eth1: renamed from tmp [ 8444.605315] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8453.994431] eth1: renamed from tmp [ 8454.023388] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8464.407702] eth1: renamed from tmp [ 8464.444876] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8474.909908] eth1: renamed from tmp [ 8474.931150] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8485.292150] eth1: renamed from tmp [ 8485.322193] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [-- MARK -- Thu Feb 2 20:30:00 2023] [ 8495.674846] eth1: renamed from tmp [ 8495.706101] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8506.129484] eth1: renamed from tmp [ 8506.161063] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8516.590465] eth1: renamed from tmp [ 8516.623241] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8527.044546] eth1: renamed from tmp [ 8527.073190] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8537.462696] eth1: renamed from tmp [ 8537.494925] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8547.900791] eth1: renamed from tmp [ 8547.922436] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8558.305175] eth1: renamed from tmp [ 8558.339754] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8568.718827] eth1: renamed from tmp [ 8568.743809] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8579.253324] eth1: renamed from tmp [ 8579.275681] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8589.744585] eth1: renamed from tmp [ 8589.776564] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8600.166758] eth1: renamed from tmp [ 8600.194790] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8610.638772] eth1: renamed from tmp [ 8610.668756] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8621.117991] eth1: renamed from tmp [ 8621.142909] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8631.532243] eth1: renamed from tmp [ 8631.554876] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8641.935350] eth1: renamed from tmp [ 8641.965650] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8652.352525] eth1: renamed from tmp [ 8652.372792] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8662.869985] eth1: renamed from tmp [ 8662.903415] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8673.344973] eth1: renamed from tmp [ 8673.368693] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8683.766055] eth1: renamed from tmp [ 8683.786275] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8694.269152] eth1: renamed from tmp [ 8694.298373] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8704.670397] eth1: renamed from tmp [ 8704.696380] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8715.071351] eth1: renamed from tmp [ 8715.092865] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8725.537578] eth1: renamed from tmp [ 8725.557711] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8735.955585] eth1: renamed from tmp [ 8736.009312] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8746.497901] eth1: renamed from tmp [ 8746.520731] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8772.143727] eth1: renamed from tmp [ 8772.165395] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [-- MARK -- Thu Feb 2 20:35:00 2023] [ 8840.444032] eth1: renamed from tmp [ 8840.471615] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 8910.903440] eth1: renamed from tmp [ 8910.932756] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9005.266716] TCP: MD5 Hash mismatch for [2001:db8:1::2]:34040->[2001:db8:1::1]:12345 L3 index 0 [ 9006.282008] TCP: MD5 Hash mismatch for [2001:db8:1::2]:34040->[2001:db8:1::1]:12345 L3 index 0 [ 9008.329692] TCP: MD5 Hash mismatch for [2001:db8:1::2]:34040->[2001:db8:1::1]:12345 L3 index 0 [ 9024.688557] TCP: MD5 Hash mismatch for [2001:db8:1::2]:33638->[2001:db8:1::1]:12345 L3 index 0 [ 9025.736572] TCP: MD5 Hash mismatch for [2001:db8:1::2]:33638->[2001:db8:1::1]:12345 L3 index 0 [ 9027.784465] TCP: MD5 Hash mismatch for [2001:db8:1::2]:33638->[2001:db8:1::1]:12345 L3 index 0 [-- MARK -- Thu Feb 2 20:40:00 2023] [ 9132.094911] TCP: MD5 Hash mismatch for [2001:db8:1::2]:52442->[2001:db8:1::1]:12345 L3 index 0 [ 9133.119601] TCP: MD5 Hash mismatch for [2001:db8:1::2]:52442->[2001:db8:1::1]:12345 L3 index 0 [ 9135.167524] TCP: MD5 Hash mismatch for [2001:db8:1::2]:52442->[2001:db8:1::1]:12345 L3 index 0 [ 9151.533332] TCP: MD5 Hash mismatch for [2001:db8:1::2]:38834->[2001:db8:1::1]:12345 L3 index 0 [ 9152.574109] TCP: MD5 Hash mismatch for [2001:db8:1::2]:38834->[2001:db8:1::1]:12345 L3 index 0 [ 9154.621930] TCP: MD5 Hash mismatch for [2001:db8:1::2]:38834->[2001:db8:1::1]:12345 L3 index 0 [ 9167.550776] eth1: renamed from tmp [ 9167.572520] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9207.055954] eth2: renamed from tmp [ 9207.077315] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready [ 9207.078552] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready [ 9220.467701] TCP: MD5 Hash mismatch for [2001:db8:1::2]:44298->[2001:db8:1::1]:12345 L3 index 13 [ 9221.496492] TCP: MD5 Hash mismatch for [2001:db8:1::2]:44298->[2001:db8:1::1]:12345 L3 index 13 [ 9223.544349] TCP: MD5 Hash mismatch for [2001:db8:1::2]:44298->[2001:db8:1::1]:12345 L3 index 13 [ 9239.844807] TCP: MD5 Hash mismatch for [2001:db8:1::2]:43368->[2001:db8:1::1]:12345 L3 index 13 [ 9240.886873] TCP: MD5 Hash mismatch for [2001:db8:1::2]:43368->[2001:db8:1::1]:12345 L3 index 13 [ 9242.934696] TCP: MD5 Hash mismatch for [2001:db8:1::2]:43368->[2001:db8:1::1]:12345 L3 index 13 [ 9262.381795] TCP: MD5 Hash mismatch for [2001:db8:1::2]:41904->[2001:db8:1::1]:12345 L3 index 0 [ 9263.413050] TCP: MD5 Hash mismatch for [2001:db8:1::2]:41904->[2001:db8:1::1]:12345 L3 index 0 [ 9265.464222] TCP: MD5 Hash mismatch for [2001:db8:1::2]:41904->[2001:db8:1::1]:12345 L3 index 0 [ 9270.506309] TCP: MD5 Hash mismatch for [2001:db8:1::2]:60806->[2001:db8:1::1]:12345 L3 index 13 [ 9271.540432] TCP: MD5 Hash mismatch for [2001:db8:1::2]:60806->[2001:db8:1::1]:12345 L3 index 13 [ 9273.588256] TCP: MD5 Hash mismatch for [2001:db8:1::2]:60806->[2001:db8:1::1]:12345 L3 index 13 [ 9284.934650] TCP: MD5 Hash mismatch for [2001:db8:1::2]:39278->[2001:db8:1::1]:12345 L3 index 0 [ 9286.003343] TCP: MD5 Hash mismatch for [2001:db8:1::2]:39278->[2001:db8:1::1]:12345 L3 index 0 [ 9288.051102] TCP: MD5 Hash mismatch for [2001:db8:1::2]:39278->[2001:db8:1::1]:12345 L3 index 0 [ 9293.069407] TCP: MD5 Hash mismatch for [2001:db8:1::2]:39282->[2001:db8:1::1]:12345 L3 index 13 [ 9294.130546] TCP: MD5 Hash mismatch for [2001:db8:1::2]:39282->[2001:db8:1::1]:12345 L3 index 13 [ 9296.178452] TCP: MD5 Hash mismatch for [2001:db8:1::2]:39282->[2001:db8:1::1]:12345 L3 index 13 [-- MARK -- Thu Feb 2 20:45:00 2023] [ 9397.480394] eth1: renamed from tmp [ 9397.509585] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9656.388405] eth1: renamed from tmp [ 9656.408561] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [-- MARK -- Thu Feb 2 20:50:00 2023] [ 9790.459587] eth1: renamed from tmp [ 9790.481100] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9808.237987] eth1: renamed from tmp [ 9808.257323] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9834.537741] eth1: renamed from tmp [ 9834.567800] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9843.765638] eth1: renamed from tmp [ 9843.784946] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9851.146014] eth1: renamed from tmp [ 9851.176992] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9861.516646] eth1: renamed from tmp [ 9861.541349] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9871.889723] eth1: renamed from tmp [ 9871.909857] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9882.152907] eth1: renamed from tmp [ 9882.182269] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9892.451161] eth1: renamed from tmp [ 9892.474458] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9902.745178] eth1: renamed from tmp [ 9902.766930] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9913.072322] eth1: renamed from tmp [ 9913.102363] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9923.329623] eth1: renamed from tmp [ 9923.356398] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9933.567779] eth1: renamed from tmp [ 9933.594425] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9943.842165] eth1: renamed from tmp [ 9943.863543] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9954.238026] eth1: renamed from tmp [ 9954.262165] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9964.592272] eth1: renamed from tmp [ 9964.621564] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9974.966494] eth1: renamed from tmp [ 9974.993906] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 9985.322617] eth1: renamed from tmp [ 9985.350338] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [-- MARK -- Thu Feb 2 20:55:00 2023] [ 9995.623732] eth1: renamed from tmp [ 9995.651479] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10005.910735] eth1: renamed from tmp [10005.936068] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10016.261150] eth1: renamed from tmp [10016.296516] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10026.540027] eth1: renamed from tmp [10026.560295] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10036.901329] eth1: renamed from tmp [10036.921891] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10047.223002] eth1: renamed from tmp [10047.248140] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10057.493654] eth1: renamed from tmp [10057.522448] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10067.863196] eth1: renamed from tmp [10067.883351] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10078.231949] eth1: renamed from tmp [10078.255780] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10088.506099] eth1: renamed from tmp [10088.524851] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10098.805295] eth1: renamed from tmp [10098.827583] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10109.159623] eth1: renamed from tmp [10109.179306] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10119.451720] eth1: renamed from tmp [10119.483232] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10129.777977] eth1: renamed from tmp [10129.797539] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10140.147962] eth1: renamed from tmp [10140.177120] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10150.510329] eth1: renamed from tmp [10150.530553] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10160.845691] eth1: renamed from tmp [10160.865677] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10171.172662] eth1: renamed from tmp [10171.201948] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10181.532474] eth1: renamed from tmp [10181.566100] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10191.887877] eth1: renamed from tmp [10191.912744] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10202.116058] eth1: renamed from tmp [10202.134765] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10212.331250] eth1: renamed from tmp [10212.359922] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10222.694034] eth1: renamed from tmp [10222.721111] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10233.159309] eth1: renamed from tmp [10233.184441] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10243.478427] eth1: renamed from tmp [10243.506078] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10253.754751] eth1: renamed from tmp [10253.782535] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10264.028980] eth1: renamed from tmp [10264.047895] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10274.314247] eth1: renamed from tmp [10274.340342] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10284.549207] eth1: renamed from tmp [10284.573781] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [-- MARK -- Thu Feb 2 21:00:00 2023] [10294.769386] eth1: renamed from tmp [10294.795148] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10305.115508] eth1: renamed from tmp [10305.155364] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10315.413867] eth1: renamed from tmp [10315.442782] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10341.724591] eth1: renamed from tmp [10341.744962] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10343.288683] br0: port 1(eth1) entered blocking state [10343.296078] br0: port 1(eth1) entered disabled state [10343.297571] device eth1 entered promiscuous mode [10343.327759] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10343.356052] br0: port 1(eth1) entered blocking state [10343.356892] br0: port 1(eth1) entered forwarding state [10343.389124] br0: port 1(eth1) entered disabled state [10343.390969] br0: port 1(eth1) entered blocking state [10343.392040] br0: port 1(eth1) entered forwarding state [10352.888396] Bridge firewalling registered [10357.284697] br0: port 1(eth1) entered disabled state [10357.294355] br0: port 1(eth1) entered blocking state [10357.295123] br0: port 1(eth1) entered forwarding state [10362.986274] Bridge firewalling registered [10367.379764] device eth1 left promiscuous mode [10367.381250] br0: port 1(eth1) entered disabled state [10369.312477] eth1: renamed from tmp [10369.344749] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10369.398592] eth2: renamed from tmp [10369.417723] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready [10373.998885] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10378.259031] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready [10384.291428] eth1: renamed from tmp [10384.314579] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10392.967507] eth1: renamed from tmp [10392.993842] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10392.995073] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [10393.094473] eth2: renamed from tmp [10393.114916] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [10397.102132] eth3: renamed from tmp [10397.139228] IPv6: ADDRCONF(NETDEV_CHANGE): eth3: link becomes ready [10397.140803] IPv6: ADDRCONF(NETDEV_CHANGE): eth3: link becomes ready [10397.286077] eth2: renamed from tmp [10397.317373] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready [10397.531213] eth0: renamed from tmp [10397.563615] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [10397.608224] br0: port 1(eth0) entered blocking state [10397.609055] br0: port 1(eth0) entered disabled state [10397.610439] device eth0 entered promiscuous mode [10397.612272] br0: port 1(eth0) entered blocking state [10397.613063] br0: port 1(eth0) entered forwarding state [10397.715057] eth1: renamed from tmp [10397.757246] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [10397.800869] br0: port 2(eth1) entered blocking state [10397.801911] br0: port 2(eth1) entered disabled state [10397.803560] device eth1 entered promiscuous mode [10397.804837] br0: port 2(eth1) entered blocking state [10397.805610] br0: port 2(eth1) entered forwarding state [10402.056515] br0: port 1(eth0) entered disabled state [10402.079079] device eth0 left promiscuous mode [10402.080270] br0: port 1(eth0) entered disabled state [10402.336006] device eth1 left promiscuous mode [10402.336847] br0: port 2(eth1) entered disabled state [10402.737140] eth1: renamed from tmp [10402.776973] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [10403.006679] eth2: renamed from tmp [10403.036349] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [10456.979373] eth0: renamed from r1h0 [10456.990601] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [10456.991831] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [10457.092499] eth1: renamed from r1h1 [10457.101429] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [10457.198570] eth2: renamed from r1h2 [10457.207193] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [10457.310439] eth3: renamed from r1h3 [10457.315509] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [10463.246326] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [10463.258836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10463.305848] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10463.432463] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [10487.721040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10487.787157] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [10487.788348] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10487.929670] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [10490.985550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10491.038520] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10491.174000] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [10492.113555] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [10492.918243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10492.967945] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10493.093241] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [10495.002777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10495.060923] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10495.188544] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [10496.145199] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [10496.898928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10496.949726] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10497.085817] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [10498.525632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10498.582112] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10498.718542] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [10501.543402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10501.604510] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10501.740058] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [10502.672623] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [10508.681786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10508.739789] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10508.872202] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [10510.067813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10510.122703] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10510.259616] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [10513.146466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10513.208002] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [10513.209228] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10513.343507] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [10515.050569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10515.104221] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10515.233732] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [10516.240487] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [-- MARK -- Thu Feb 2 21:05:00 2023] [10816.559870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [10816.615265] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [10816.616459] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [10816.747582] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [-- MARK -- Thu Feb 2 21:10:00 2023] [11117.988781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11118.053775] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [11118.192943] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [11119.666370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11119.719270] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [11119.857305] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [11122.634264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11122.687167] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [11122.825084] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [11124.489015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11124.538063] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [11124.672037] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [11127.447981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11127.517180] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [11127.654983] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [11135.567292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11135.632739] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [11135.634330] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [11135.775022] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [11137.043067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11137.098966] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [11137.239975] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [11139.131865] systemd-journald[572]: Data hash table of /run/log/journal/d5d3542be8d8469cb02596ae71801d53/system.journal has a fill level at 75.0 (6997 of 9329 items, 5373952 file size, 768 bytes per hash table item), suggesting rotation. [11139.134932] systemd-journald[572]: /run/log/journal/d5d3542be8d8469cb02596ae71801d53/system.journal: Journal header limits reached or header out-of-date, rotating. [11140.214991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11140.266930] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [11140.268194] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [11140.424560] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [11142.112663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11142.163768] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [11142.304969] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [11143.324743] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [-- MARK -- Thu Feb 2 21:15:00 2023] [11443.643183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11443.714132] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [11443.715752] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [11443.852242] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [-- MARK -- Thu Feb 2 21:20:00 2023] [11748.923921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [11749.931500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [11754.775017] eth0: renamed from r1h1 [11754.828923] eth0: renamed from r2h1 [11754.889855] eth2: renamed from r2h2 [11754.897246] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11754.948022] eth1: renamed from r2r1 [11754.956057] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11755.022439] br0: port 1(eth0) entered blocking state [11755.023306] br0: port 1(eth0) entered disabled state [11755.024707] device eth0 entered promiscuous mode [11755.031294] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11755.032599] br0: port 1(eth0) entered blocking state [11755.033396] br0: port 1(eth0) entered forwarding state [11755.034357] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11755.043995] br0: port 2(eth1) entered blocking state [11755.045053] br0: port 2(eth1) entered disabled state [11755.046385] device eth1 entered promiscuous mode [11755.048022] br0: port 2(eth1) entered blocking state [11755.048836] br0: port 2(eth1) entered forwarding state [11755.050324] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11766.447945] device eth1 left promiscuous mode [11766.448768] br0: port 2(eth1) entered disabled state [11766.459877] device eth0 left promiscuous mode [11766.460650] br0: port 1(eth0) entered disabled state [11767.066818] eth0: renamed from r1h1 [11767.123940] eth0: renamed from r2h1 [11767.184850] eth2: renamed from r2h2 [11767.192608] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11767.246827] eth1: renamed from r2r1 [11767.254028] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11767.459560] br0: port 1(eth0) entered blocking state [11767.460387] br0: port 1(eth0) entered disabled state [11767.461706] device eth0 entered promiscuous mode [11767.463344] br0: port 1(eth0) entered blocking state [11767.464117] br0: port 1(eth0) entered forwarding state [11767.465400] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11767.479063] br0: port 2(eth1) entered blocking state [11767.479895] br0: port 2(eth1) entered disabled state [11767.481600] device eth1 entered promiscuous mode [11767.482664] br0: port 2(eth1) entered blocking state [11767.483426] br0: port 2(eth1) entered forwarding state [11767.484746] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11778.945032] device eth1 left promiscuous mode [11778.946215] br0: port 2(eth1) entered disabled state [11778.957864] device eth0 left promiscuous mode [11778.958983] br0: port 1(eth0) entered disabled state [11779.644297] eth0: renamed from r1h1 [11779.698180] eth0: renamed from r2h1 [11779.769126] eth2: renamed from r2h2 [11779.778333] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11779.841784] eth1: renamed from r2r1 [11779.848979] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11779.915533] br0: port 1(eth0) entered blocking state [11779.916425] br0: port 1(eth0) entered disabled state [11779.917784] device eth0 entered promiscuous mode [11779.920444] br0: port 1(eth0) entered blocking state [11779.921208] br0: port 1(eth0) entered forwarding state [11779.922461] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11779.938248] br0: port 2(eth1) entered blocking state [11779.939274] br0: port 2(eth1) entered disabled state [11779.940629] device eth1 entered promiscuous mode [11779.941877] br0: port 2(eth1) entered blocking state [11779.942624] br0: port 2(eth1) entered forwarding state [11779.943820] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [-- MARK -- Thu Feb 2 21:25:00 2023] [11791.431900] device eth1 left promiscuous mode [11791.438706] br0: port 2(eth1) entered disabled state [11791.449802] device eth0 left promiscuous mode [11791.450679] br0: port 1(eth0) entered disabled state [11792.155873] eth0: renamed from r1h1 [11792.209911] eth0: renamed from r2h1 [11792.283266] eth2: renamed from r2h2 [11792.293267] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11792.354805] eth1: renamed from r2r1 [11792.363080] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11792.575296] br0: port 1(eth0) entered blocking state [11792.576126] br0: port 1(eth0) entered disabled state [11792.578433] device eth0 entered promiscuous mode [11792.580410] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11792.581622] br0: port 1(eth0) entered blocking state [11792.582381] br0: port 1(eth0) entered forwarding state [11792.583236] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11792.595743] br0: port 2(eth1) entered blocking state [11792.596525] br0: port 2(eth1) entered disabled state [11792.598159] device eth1 entered promiscuous mode [11792.599273] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11792.600758] br0: port 2(eth1) entered blocking state [11792.601493] br0: port 2(eth1) entered forwarding state [11792.602864] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11804.196132] device eth1 left promiscuous mode [11804.197082] br0: port 2(eth1) entered disabled state [11804.202916] device eth0 left promiscuous mode [11804.203724] br0: port 1(eth0) entered disabled state [11806.304719] IPv6: ADDRCONF(NETDEV_CHANGE): swp3: link becomes ready [11806.311132] IPv6: ADDRCONF(NETDEV_CHANGE): h3: link becomes ready [11806.345845] IPv6: ADDRCONF(NETDEV_CHANGE): swp1: link becomes ready [11806.347049] IPv6: ADDRCONF(NETDEV_CHANGE): h1: link becomes ready [11806.396645] ip6_tunnel: er6 xmit: Local address not yet configured! [11806.422642] ip6_tunnel: gt6 xmit: Local address not yet configured! [11806.654685] ip6_tunnel: er6 xmit: Local address not yet configured! [11806.878679] ip6_tunnel: gt6 xmit: Local address not yet configured! [11806.918762] ip6_tunnel: gt6 xmit: Local address not yet configured! [11807.078674] ip6_tunnel: er6 xmit: Local address not yet configured! [11807.497237] ip6_tunnel: gt6 xmit: Local address not yet configured! [11813.686948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [11818.244205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [11824.270669] ip_local_port_range: prefer different parity for start/end values. [11826.226422] netem: version 1.3 [11832.300516] eth0: renamed from tmp [11832.319885] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11832.321126] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11832.837570] alg: No test for authenc(hmac(md5),cbc(des3_ede)) (authenc(hmac(md5-generic),cbc-des3_ede-asm)) [11832.839684] alg: No test for echainiv(authenc(hmac(md5),cbc(des3_ede))) (echainiv(authenc(hmac(md5-generic),cbc-des3_ede-asm))) [11833.303415] IPsec XFRM device driver [11844.193603] eth0: renamed from r1h1 [11844.245883] eth1: renamed from r1h2 [11844.292555] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11844.294285] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11844.359367] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11847.219422] eth0: renamed from r1h1 [11847.298079] eth1: renamed from r1h2 [11847.342166] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11847.402567] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11850.274135] eth0: renamed from r1h1 [11850.319262] eth1: renamed from r1h2 [11850.368147] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11850.440965] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11853.493708] eth0: renamed from r1h1 [11853.542864] eth0: renamed from r2h1 [11853.592860] eth1: renamed from r1h2 [11853.641023] eth1: renamed from r2h2 [11853.723012] br0: port 1(eth0) entered blocking state [11853.723871] br0: port 1(eth0) entered disabled state [11853.725178] device eth0 entered promiscuous mode [11853.726388] br0: port 1(eth0) entered blocking state [11853.727166] br0: port 1(eth0) entered forwarding state [11853.728333] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11853.741928] br0: port 2(eth1) entered blocking state [11853.742783] br0: port 2(eth1) entered disabled state [11853.744098] device eth1 entered promiscuous mode [11853.745407] br0: port 2(eth1) entered blocking state [11853.746181] br0: port 2(eth1) entered forwarding state [11853.747289] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11853.838039] br0: port 1(eth0) entered blocking state [11853.844687] br0: port 1(eth0) entered disabled state [11853.846681] device eth0 entered promiscuous mode [11853.848770] br0: port 1(eth0) entered blocking state [11853.849911] br0: port 1(eth0) entered forwarding state [11853.851474] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11853.866663] br0: port 2(eth1) entered blocking state [11853.868036] br0: port 2(eth1) entered disabled state [11853.869904] device eth1 entered promiscuous mode [11853.871565] br0: port 2(eth1) entered blocking state [11853.872742] br0: port 2(eth1) entered forwarding state [11853.874282] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11856.512633] device eth1 left promiscuous mode [11856.513501] br0: port 2(eth1) entered disabled state [11856.518303] device eth0 left promiscuous mode [11856.519081] br0: port 1(eth0) entered disabled state [11856.804704] device eth1 left promiscuous mode [11856.805692] br0: port 2(eth1) entered disabled state [11856.812277] device eth0 left promiscuous mode [11856.813207] br0: port 1(eth0) entered disabled state [11856.910489] eth0: renamed from r1h1 [11856.957644] eth0: renamed from r2h1 [11857.008454] eth1: renamed from r1h2 [11857.058395] eth1: renamed from r2h2 [11857.133820] br0: port 1(eth0) entered blocking state [11857.134684] br0: port 1(eth0) entered disabled state [11857.136002] device eth0 entered promiscuous mode [11857.137551] br0: port 1(eth0) entered blocking state [11857.138308] br0: port 1(eth0) entered forwarding state [11857.139477] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11857.158696] br0: port 2(eth1) entered blocking state [11857.159790] br0: port 2(eth1) entered disabled state [11857.161646] device eth1 entered promiscuous mode [11857.163447] br0: port 2(eth1) entered blocking state [11857.164448] br0: port 2(eth1) entered forwarding state [11857.165987] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11857.277456] br0: port 1(eth0) entered blocking state [11857.278577] br0: port 1(eth0) entered disabled state [11857.280487] device eth0 entered promiscuous mode [11857.282190] br0: port 1(eth0) entered blocking state [11857.282992] br0: port 1(eth0) entered forwarding state [11857.284227] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11857.298532] br0: port 2(eth1) entered blocking state [11857.299593] br0: port 2(eth1) entered disabled state [11857.301008] device eth1 entered promiscuous mode [11857.302270] br0: port 2(eth1) entered blocking state [11857.303080] br0: port 2(eth1) entered forwarding state [11857.304155] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11859.916486] device eth1 left promiscuous mode [11859.917305] br0: port 2(eth1) entered disabled state [11859.929996] device eth0 left promiscuous mode [11859.930786] br0: port 1(eth0) entered disabled state [11860.242230] eth0: renamed from r1h1 [11860.251312] device eth1 left promiscuous mode [11860.252425] br0: port 2(eth1) entered disabled state [11860.259378] device eth0 left promiscuous mode [11860.260165] br0: port 1(eth0) entered disabled state [11860.374413] eth1: renamed from r1h2 [11860.418652] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11860.478766] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11863.310522] eth0: renamed from r1h1 [11863.356901] eth1: renamed from r1h2 [11863.404156] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11863.471998] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11866.351896] eth0: renamed from r1h1 [11866.399755] eth1: renamed from r1h2 [11866.442889] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11866.503457] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11871.484527] eth0: renamed from r1h1 [11871.531445] eth0: renamed from r2h1 [11871.577447] eth1: renamed from r1h2 [11871.623417] eth1: renamed from r2h2 [11871.698773] br0: port 1(eth0) entered blocking state [11871.699595] br0: port 1(eth0) entered disabled state [11871.700939] device eth0 entered promiscuous mode [11871.702879] br0: port 1(eth0) entered blocking state [11871.703661] br0: port 1(eth0) entered forwarding state [11871.704824] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11871.719025] br0: port 2(eth1) entered blocking state [11871.719858] br0: port 2(eth1) entered disabled state [11871.721549] device eth1 entered promiscuous mode [11871.723396] br0: port 2(eth1) entered blocking state [11871.724182] br0: port 2(eth1) entered forwarding state [11871.725475] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11871.819781] br0: port 1(eth0) entered blocking state [11871.820631] br0: port 1(eth0) entered disabled state [11871.822382] device eth0 entered promiscuous mode [11871.824315] br0: port 1(eth0) entered blocking state [11871.825072] br0: port 1(eth0) entered forwarding state [11871.826722] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11871.843230] br0: port 2(eth1) entered blocking state [11871.844007] br0: port 2(eth1) entered disabled state [11871.845568] device eth1 entered promiscuous mode [11871.847008] br0: port 2(eth1) entered blocking state [11871.847797] br0: port 2(eth1) entered forwarding state [11871.848836] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11874.475096] device eth1 left promiscuous mode [11874.483708] br0: port 2(eth1) entered disabled state [11874.494278] device eth0 left promiscuous mode [11874.495143] br0: port 1(eth0) entered disabled state [11874.771609] device eth1 left promiscuous mode [11874.772436] br0: port 2(eth1) entered disabled state [11874.782320] device eth0 left promiscuous mode [11874.783108] br0: port 1(eth0) entered disabled state [11874.947879] eth0: renamed from r1h1 [11874.997919] eth0: renamed from r2h1 [11875.045511] eth1: renamed from r1h2 [11875.089882] eth1: renamed from r2h2 [11875.161955] br0: port 1(eth0) entered blocking state [11875.162744] br0: port 1(eth0) entered disabled state [11875.164414] device eth0 entered promiscuous mode [11875.165646] br0: port 1(eth0) entered blocking state [11875.166407] br0: port 1(eth0) entered forwarding state [11875.167598] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11875.180969] br0: port 2(eth1) entered blocking state [11875.181740] br0: port 2(eth1) entered disabled state [11875.183174] device eth1 entered promiscuous mode [11875.184436] br0: port 2(eth1) entered blocking state [11875.185204] br0: port 2(eth1) entered forwarding state [11875.186298] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [11875.275638] br0: port 1(eth0) entered blocking state [11875.276464] br0: port 1(eth0) entered disabled state [11875.277753] device eth0 entered promiscuous mode [11875.279136] br0: port 1(eth0) entered blocking state [11875.279893] br0: port 1(eth0) entered forwarding state [11875.281144] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11875.294797] br0: port 2(eth1) entered blocking state [11875.295597] br0: port 2(eth1) entered disabled state [11875.297125] device eth1 entered promiscuous mode [11875.298314] br0: port 2(eth1) entered blocking state [11875.299076] br0: port 2(eth1) entered forwarding state [11875.300078] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [11877.934793] device eth1 left promiscuous mode [11877.935644] br0: port 2(eth1) entered disabled state [11877.940445] device eth0 left promiscuous mode [11877.941236] br0: port 1(eth0) entered disabled state [11878.253146] device eth1 left promiscuous mode [11878.253995] br0: port 2(eth1) entered disabled state [11878.262706] device eth0 left promiscuous mode [11878.263511] br0: port 1(eth0) entered disabled state [11880.260469] IPv6: ADDRCONF(NETDEV_CHANGE): veth01: link becomes ready [11880.339214] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready [11880.413837] IPv6: ADDRCONF(NETDEV_CHANGE): veth23: link becomes ready [11881.189991] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready [11886.308991] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11886.617077] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11886.912574] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11887.206076] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11887.501559] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11887.787576] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11888.169216] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11888.200153] IPv6: ADDRCONF(NETDEV_CHANGE): bar: link becomes ready [11888.703389] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11888.729230] IPv6: ADDRCONF(NETDEV_CHANGE): bar: link becomes ready [11889.105304] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11889.402160] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11889.804513] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11889.831950] IPv6: ADDRCONF(NETDEV_CHANGE): bar: link becomes ready [11890.218266] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11890.490944] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11890.748901] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11890.995279] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11891.650393] IPv6: ADDRCONF(NETDEV_CHANGE): foo: link becomes ready [11891.676756] IPv6: ADDRCONF(NETDEV_CHANGE): bar: link becomes ready [11893.771899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11893.773522] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11894.395227] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11895.019669] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11895.677822] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11902.409897] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11903.251607] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11904.122784] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11911.097210] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11911.734160] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11912.425994] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11913.191041] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11919.913650] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11920.777107] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11921.693203] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11930.537414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11930.547818] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11931.520935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11931.522577] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11932.269514] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11932.591530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11933.146259] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11934.551350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11934.552680] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11934.947940] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [11934.949339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [11937.328774] IPv6: ADDRCONF(NETDEV_CHANGE): client: link becomes ready [11937.333237] IPv6: ADDRCONF(NETDEV_CHANGE): server: link becomes ready [11938.155932] IPv6: ADDRCONF(NETDEV_CHANGE): client: link becomes ready [11938.157210] IPv6: ADDRCONF(NETDEV_CHANGE): server: link becomes ready [11938.995473] IPv6: ADDRCONF(NETDEV_CHANGE): server: link becomes ready [11939.821744] IPv6: ADDRCONF(NETDEV_CHANGE): client: link becomes ready [11939.823051] IPv6: ADDRCONF(NETDEV_CHANGE): server: link becomes ready [11940.654210] IPv6: ADDRCONF(NETDEV_CHANGE): client: link becomes ready [11940.655543] IPv6: ADDRCONF(NETDEV_CHANGE): server: link becomes ready [11946.502641] IPv6: ADDRCONF(NETDEV_CHANGE): client: link becomes ready [11946.503932] IPv6: ADDRCONF(NETDEV_CHANGE): server: link becomes ready [11948.427599] IPv6: ADDRCONF(NETDEV_CHANGE): client: link becomes ready [11948.429931] IPv6: ADDRCONF(NETDEV_CHANGE): server: link becomes ready [11949.252512] IPv6: ADDRCONF(NETDEV_CHANGE): client: link becomes ready [11949.253797] IPv6: ADDRCONF(NETDEV_CHANGE): server: link becomes ready [11950.085498] IPv6: ADDRCONF(NETDEV_CHANGE): server: link becomes ready [11950.932628] IPv6: ADDRCONF(NETDEV_CHANGE): client: link becomes ready [11950.933947] IPv6: ADDRCONF(NETDEV_CHANGE): server: link becomes ready [11951.768472] IPv6: ADDRCONF(NETDEV_CHANGE): client: link becomes ready [11951.769799] IPv6: ADDRCONF(NETDEV_CHANGE): server: link becomes ready [11952.563138] IPv6: ADDRCONF(NETDEV_CHANGE): server: link becomes ready [11956.230694] veth0: renamed from veth1 [11956.253750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [11956.255033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [11956.414351] ip6_tunnel: gre1 xmit: Local address not yet configured! [11956.442895] ip6_tunnel: gre1 xmit: Local address not yet configured! [12003.643736] Running test [R:13327125 T:14 - Reboot test - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [12003.822296] systemd-journald[572]: Received client request to flush runtime journal. Stopping Session 2 of User root ... [ OK ] Removed slice Slice /system/modprobe . [ OK ] Removed slice Slice /system/sshd-keygen . [ OK ] Removed slice Slice /system/systemd-coredump . [ OK ] Removed slice Slice /system/systemd-hibernate-resume . [ OK ] Stopped target Multi-User System . [ OK ] Stopped target Login Prompts . [ OK ] Stopped target rpc_pipefs.target . [ OK ] Stopped target RPC Port Mapper . [ OK ] Stopped target Timer Units . [ OK ] Stopped dnf makecache --timer . [ OK ] Stopped Daily rotation of log files . [ OK ] Stopped Daily Cleanup of Temporary Directories . [ OK ] Closed LVM2 poll daemon socket . [ OK ] Closed Process Core Dump Socket . [ OK ] Closed Load/Save RF Kill Switch Status /dev/rfkill Watch . Unmounting RPC Pipe File System ... Stopping NTP client/server ... Stopping Command Scheduler ... Stopping Restore /run/initramfs on shutdown ... Stopping Getty on tty1 ... Stopping irqbalance daemon ... Stopping The restraint harness. ... Stopping System Logging Service ... Stopping Serial Getty on ttyS0 ... Stopping OpenSSH server daemon ... Stopping Hostname Service ... Stopping Load/Save Random Seed ... [ OK ] Stopped irqbalance daemon . [ OK ] Stopped Getty on tty1 . [ OK ] Stopped OpenSSH server daemon . [ OK ] Stopped Serial Getty on ttyS0 . [ OK ] Stopped Command Scheduler . [ OK ] Stopped The restraint harness. . [ OK ] Stopped NTP client/server . [ OK ] Stopped Hostname Service . [12004.729316] vda1: Can't mount, would change RO state [ OK ] Stopped System Logging Service . [ OK ] Unmounted RPC Pipe File System . [ OK ] Stopped Load/Save Random Seed . [ OK ] Stopped Session 2 of User root . [ OK ] Removed slice Slice /system/getty . [ OK ] Removed slice Slice /system/serial-getty . [ OK ] Stopped target sshd-keygen.target . [ OK ] Stopped target System Time Synchronized . [ OK ] Stopped target System Time Set . Stopping User Login Management ... Stopping Permit User Sessions ... Stopping User Manager for UID 0 ... [ OK ] Stopped User Manager for UID 0 . [ OK ] Stopped Permit User Sessions . [ OK ] Stopped User Login Management . [ OK ] Stopped target User and Group Name Lookups . [ OK ] Stopped target Remote File Systems . Unmounting /var/crash ... Stopping User Runtime Directory /run/user/0 ... [ OK ] Unmounted /run/user/0 . [ OK ] Stopped User Runtime Directory /run/user/0 . [ OK ] Removed slice User Slice of UID 0 . [ OK ] Unmounted /var/crash . [ OK ] Stopped target Network is Online . [ OK ] Stopped target Preparation for Remote File Systems . [ OK ] Stopped target NFS client services . Stopping GSSAPI Proxy Daemon ... [ OK ] Stopped GSSAPI Proxy Daemon . [ OK ] Stopped target Network . Stopping Network Manager ... [ OK ] Stopped Network Manager . [ OK ] Stopped target Preparation for Network . [ OK ] Stopped Generate network units from Kernel command line . [ * * * ] A stop job is running for Restore /…tramfs on shutdown (2s / no limit) M [ * * * ] A stop job is running for Restore /…tramfs on shutdown (3s / no limit) M [ * * * ] A stop job is running for Restore /…tramfs on shutdown (3s / no limit) M [ * * * ] A stop job is running for Restore /…tramfs on shutdown (4s / no limit) M [ OK ] Stopped Restore /run/initramfs on shutdown . [ OK ] Stopped target Basic System . [ OK ] Stopped target Path Units . [ OK ] Stopped target Slice Units . [ OK ] Removed slice User and Session Slice . [ OK ] Stopped target Socket Units . [ OK ] Closed SSSD Kerberos Cache Manager responder socket . Stopping D-Bus System Message Bus ... [ OK ] Stopped D-Bus System Message Bus . [ OK ] Closed D-Bus System Message Bus Socket . [ OK ] Stopped target System Initialization . [ OK ] Unset automount Arbitrary …s File System Automount Point . [ OK ] Stopped target Local Encrypted Volumes . [ OK ] Stopped Dispatch Password …ts to Console Directory Watch . [ OK ] Stopped Forward Password R…uests to Wall Directory Watch . [ OK ] Stopped target Local Integrity Protected Volumes . [ OK ] Stopped target Local Verity Protected Volumes . [ OK ] Stopped Read and set NIS d…e from /etc/sysconfig/network . [ OK ] Stopped Automatic Boot Loader Update . [ OK ] Stopped Apply Kernel Variables . Stopping Record System Boot/Shutdown in UTMP ... [ OK ] Unmounted /run/credentials/systemd-sysctl.service . [ OK ] Stopped Record System Boot/Shutdown in UTMP . Stopping Security Auditing Service ... [12009.079947] audit: type=1305 audit(1675373321.456:7414): op=set audit_pid=0 old=627 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 [ OK ] Stopped Security Auditing Service . [12009.094403] audit: type=1131 audit(1675373321.471:7415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=auditd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Stopped Create Volatile Files and Directories . [12009.099613] audit: type=1131 audit(1675373321.476:7416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Stopped target Local File Systems . Unmounting /boot ... Unmounting /run/credential…temd-tmpfiles-setup.service ... Unmounting /run/credential…-tmpfiles-setup-dev.service ... Unmounting /run/netns ... [ OK ] Unmounted /run/credentials…ystemd-tmpfiles-setup.service . [ OK ] Unmounted /run/credentials…md-tmpfiles-setup-dev.service . [12009.204911] XFS (vda1): Unmounting Filesystem [ OK ] Unmounted /run/netns . [ OK ] Stopped target Swaps . Deactivating swap /dev/cs_kvm-06-guest28/swap ... [ OK ] Deactivated swap /dev/disk…name-cs_kvm--06--guest28-swap . [ OK ] Deactivated swap /dev/disk…2-d2bd-4384-8ed0-da106b338941 . [ OK ] Deactivated swap /dev/cs_kvm-06-guest28/swap . [ OK ] Deactivated swap /dev/disk…qv4LuEPs8R7jOjKFiM8MUF3pOegff . [ OK ] Deactivated swap /dev/dm-1 . [ OK ] Deactivated swap /dev/mapper/cs_kvm--06--guest28-swap . [ OK ] Unmounted /boot . [ OK ] Stopped target Preparation for Local File Systems . [ OK ] Reached target Unmount All Filesystems . Stopping Monitoring of LVM…meventd or progress polling ... [ OK ] Stopped Remount Root and Kernel File Systems . [12009.323383] audit: type=1131 audit(1675373321.700:7417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Stopped Create Static Device Nodes in /dev . [12009.329823] audit: type=1131 audit(1675373321.705:7418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Stopped Monitoring of LVM2… dmeventd or progress polling . [12009.446858] audit: type=1131 audit(1675373321.823:7419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=lvm2-monitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Reached target System Shutdown . [ OK ] Reached target Late Shutdown Services . [ OK ] Finished System Reboot . [12009.456102] audit: type=1130 audit(1675373321.832:7420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-reboot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Reached target Syst[12009.459571] audit: type=1131 audit(1675373321.833:7421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-reboot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' em Reboot . [12009.468955] audit: type=1334 audit(1675373321.845:7422): prog-id=0 op=UNLOAD [12009.471181] audit: type=1334 audit(1675373321.847:7423): prog-id=0 op=UNLOAD [12009.564450] systemd-shutdown[1]: Syncing filesystems and block devices. [12009.608880] systemd-shutdown[1]: Sending SIGTERM to remaining processes... [12009.635744] systemd-journald[572]: Received SIGTERM from PID 1 (systemd-shutdow). [12009.664615] systemd-shutdown[1]: Sending SIGKILL to remaining processes... [12009.690852] systemd-shutdown[1]: Unmounting file systems. [12009.698247] [351762]: Remounting '/' read-only with options 'seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota'. [12010.556799] systemd-shutdown[1]: All filesystems unmounted. [12010.558486] systemd-shutdown[1]: Deactivating swaps. [12010.559833] systemd-shutdown[1]: All swaps deactivated. [12010.560583] systemd-shutdown[1]: Detaching loop devices. [12010.561816] systemd-shutdown[1]: All loop devices detached. [12010.562602] systemd-shutdown[1]: Stopping MD devices. [12010.563656] systemd-shutdown[1]: All MD devices stopped. [12010.564407] systemd-shutdown[1]: Detaching DM devices. [12010.569500] systemd-shutdown[1]: Detaching DM /dev/dm-1 (253:1). [12010.594403] systemd-shutdown[1]: Not all DM devices detached, 1 left. [12010.595750] systemd-shutdown[1]: Detaching DM devices. [12010.598694] systemd-shutdown[1]: Not all DM devices detached, 1 left. [12010.599619] systemd-shutdown[1]: Cannot finalize remaining DM devices, continuing. [12010.611305] systemd-shutdown[1]: Successfully changed into root pivot. [12010.612445] systemd-shutdown[1]: Returning to initrd... [12010.849921] dracut Warning: Killing all remaining processes dracut Warning: Killing all remaining processes [12013.361472] XFS (dm-0): Unmounting Filesystem [12014.898932] dracut Warning: Unmounted /oldroot. dracut Warning: Unmounted /oldroot. [12015.126537] dracut: Disassembling device-mapper devices Rebooting. [12015.288310] reboot: Restarting system [12015.288907] reboot: machine restart [?25l Use the ^ and v keys to change the selection. Press 'e' to edit the selected item, or 'c' for a command prompt. CentOS Stream (5.14.0-254.1844_765618331.el9.x86_64+debug) 9 with debugg> CentOS Stream (5.14.0-247.el9.x86_64) 9 CentOS Stream (0-rescue-d5d3542be8d8469cb02596ae71801d53) 9 The selected entry will be started automatically in 5s. The selected entry will be started automatically in 4s. The selected entry will be started automatically in 3s. The selected entry will be started automatically in 2s. The selected entry will be started automatically in 1s. The selected entry will be started automatically in 0s. [ 0.000000] [ 0.000000] The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. [ 0.000000] Command line: BOOT_IMAGE=(hd0,msdos1)/vmlinuz-5.14.0-254.1844_765618331.el9.x86_64+debug root=/dev/mapper/cs_kvm--06--guest28-root ro resume=/dev/mapper/cs_kvm--06--guest28-swap rd.lvm.lv=cs_kvm-06-guest28/root rd.lvm.lv=cs_kvm-06-guest28/swap console=ttyS0,115200 crashkernel=1G-2G:384M,2G-3G:512M,3G-4G:768M,4G-16G:1G,16G-64G:2G,64G-128G:2G,128G-:4G [ 0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' [ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 0.000000] x86/fpu: xstate_offset[3]: 960, xstate_sizes[3]: 64 [ 0.000000] x86/fpu: xstate_offset[4]: 1024, xstate_sizes[4]: 64 [ 0.000000] x86/fpu: xstate_offset[5]: 1088, xstate_sizes[5]: 64 [ 0.000000] x86/fpu: xstate_offset[6]: 1152, xstate_sizes[6]: 512 [ 0.000000] x86/fpu: xstate_offset[7]: 1664, xstate_sizes[7]: 1024 [ 0.000000] x86/fpu: xstate_offset[9]: 2688, xstate_sizes[9]: 8 [ 0.000000] x86/fpu: Enabled xstate features 0x2ff, context size is 2696 bytes, using 'standard' format. [ 0.000000] signal: max sigframe size: 3632 [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable [ 0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000bfff9fff] usable [ 0.000000] BIOS-e820: [mem 0x00000000bfffa000-0x00000000bfffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] SMBIOS 2.4 present. [ 0.000000] DMI: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 0.000000] Hypervisor detected: KVM [ 0.000000] kvm-clock: Using msrs 4b564d01 and 4b564d00 [ 0.000011] kvm-clock: using sched offset of 2613640720001815 cycles [ 0.000025] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns [ 0.000058] tsc: Detected 2095.076 MHz processor [ 0.000886] last_pfn = 0x140000 max_arch_pfn = 0x400000000 [ 0.000974] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 0.001007] last_pfn = 0xbfffa max_arch_pfn = 0x400000000 [ 0.016080] found SMP MP-table at [mem 0x000f6390-0x000f639f] [ 0.016225] Using GB pages for direct mapping [ 0.017799] RAMDISK: [mem 0x339cd000-0x35cdefff] [ 0.017845] ACPI: Early table checksum verification disabled [ 0.017900] ACPI: RSDP 0x00000000000F61A0 000014 (v00 BOCHS ) [ 0.017935] ACPI: RSDT 0x00000000BFFFFB40 000030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) [ 0.017978] ACPI: FACP 0x00000000BFFFF177 000074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) [ 0.018007] ACPI: DSDT 0x00000000BFFFE040 001137 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) [ 0.018026] ACPI: FACS 0x00000000BFFFE000 000040 [ 0.018043] ACPI: SSDT 0x00000000BFFFF1EB 0008D5 (v01 BOCHS BXPCSSDT 00000001 BXPC 00000001) [ 0.018060] ACPI: APIC 0x00000000BFFFFAC0 000080 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) [ 0.018075] ACPI: Reserving FACP table memory at [mem 0xbffff177-0xbffff1ea] [ 0.018081] ACPI: Reserving DSDT table memory at [mem 0xbfffe040-0xbffff176] [ 0.018086] ACPI: Reserving FACS table memory at [mem 0xbfffe000-0xbfffe03f] [ 0.018091] ACPI: Reserving SSDT table memory at [mem 0xbffff1eb-0xbffffabf] [ 0.018095] ACPI: Reserving APIC table memory at [mem 0xbffffac0-0xbffffb3f] [ 0.018837] No NUMA configuration found [ 0.018848] Faking a node at [mem 0x0000000000000000-0x000000013fffffff] [ 0.018874] NODE_DATA(0) allocated [mem 0x13ffd3000-0x13fffdfff] [ 0.019854] Reserving 1024MB of memory at 2032MB for crashkernel (System RAM: 4095MB) [ 0.075769] Zone ranges: [ 0.075778] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.075788] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 0.075796] Normal [mem 0x0000000100000000-0x000000013fffffff] [ 0.075804] Device empty [ 0.075811] Movable zone start for each node [ 0.075816] Early memory node ranges [ 0.075820] node 0: [mem 0x0000000000001000-0x000000000009efff] [ 0.075825] node 0: [mem 0x0000000000100000-0x00000000bfff9fff] [ 0.075831] node 0: [mem 0x0000000100000000-0x000000013fffffff] [ 0.075842] Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] [ 0.075867] On node 0, zone DMA: 1 pages in unavailable ranges [ 0.076118] On node 0, zone DMA: 97 pages in unavailable ranges [ 0.128979] On node 0, zone Normal: 6 pages in unavailable ranges [ 0.900746] kasan: KernelAddressSanitizer initialized [ 0.901460] ACPI: PM-Timer IO Port: 0x608 [ 0.901513] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) [ 0.901614] IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 [ 0.901637] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) [ 0.901645] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) [ 0.901650] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 0.901666] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) [ 0.901672] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) [ 0.901689] ACPI: Using ACPI (MADT) for SMP configuration information [ 0.901704] TSC deadline timer available [ 0.901715] smpboot: Allowing 2 CPUs, 0 hotplug CPUs [ 0.901899] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 0.901915] PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] [ 0.901922] PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] [ 0.901927] PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] [ 0.901935] PM: hibernation: Registered nosave memory: [mem 0xbfffa000-0xbfffffff] [ 0.901939] PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] [ 0.901943] PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] [ 0.901947] PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] [ 0.901951] PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] [ 0.901968] [mem 0xc0000000-0xfeffbfff] available for PCI devices [ 0.901973] Booting paravirtualized kernel on KVM [ 0.901998] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns [ 0.925529] setup_percpu: NR_CPUS:8192 nr_cpumask_bits:2 nr_cpu_ids:2 nr_node_ids:1 [ 0.935656] percpu: Embedded 515 pages/cpu s2072576 r8192 d28672 u4194304 [ 0.935943] kvm-guest: PV spinlocks enabled [ 0.935970] PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) [ 0.936030] Fallback order for Node 0: 0 [ 0.936065] Built 1 zonelists, mobility grouping on. Total pages: 1031930 [ 0.936070] Policy zone: Normal [ 0.936078] Kernel command line: BOOT_IMAGE=(hd0,msdos1)/vmlinuz-5.14.0-254.1844_765618331.el9.x86_64+debug root=/dev/mapper/cs_kvm--06--guest28-root ro resume=/dev/mapper/cs_kvm--06--guest28-swap rd.lvm.lv=cs_kvm-06-guest28/root rd.lvm.lv=cs_kvm-06-guest28/swap console=ttyS0,115200 crashkernel=1G-2G:384M,2G-3G:512M,3G-4G:768M,4G-16G:1G,16G-64G:2G,64G-128G:2G,128G-:4G [ 0.936735] Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/vmlinuz-5.14.0-254.1844_765618331.el9.x86_64+debug", will be passed to user space. [ 0.940245] Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) [ 0.942032] Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) [ 0.942229] mem auto-init: stack:off, heap alloc:off, heap free:off [ 0.942240] Stack Depot early init allocating hash table with memblock_alloc, 8388608 bytes [ 0.949340] software IO TLB: area num 2. [ 2.107652] Memory: 2000476K/4193888K available (38920K kernel code, 13007K rwdata, 14984K rodata, 5300K init, 42020K bss, 2142328K reserved, 0K cma-reserved) [ 2.107710] random: get_random_u64 called from kmem_cache_open+0x22/0x380 with crng_init=0 [ 2.110447] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 [ 2.110461] kmemleak: Kernel memory leak detector disabled [ 2.114166] Kernel/User page tables isolation: enabled [ 2.114482] ftrace: allocating 45745 entries in 179 pages [ 2.170538] ftrace: allocated 179 pages with 5 groups [ 2.175300] Dynamic Preempt: voluntary [ 2.175851] Running RCU self tests [ 2.175891] rcu: Preemptible hierarchical RCU implementation. [ 2.175899] rcu: RCU lockdep checking is enabled. [ 2.175907] rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=2. [ 2.175912] rcu: RCU callback double-/use-after-free debug is enabled. [ 2.175916] Trampoline variant of Tasks RCU enabled. [ 2.175920] Rude variant of Tasks RCU enabled. [ 2.175923] Tracing variant of Tasks RCU enabled. [ 2.175927] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. [ 2.175932] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 [ 2.198855] NR_IRQS: 524544, nr_irqs: 440, preallocated irqs: 16 [ 2.199592] rcu: srcu_init: Setting srcu_struct sizes based on contention. [ 2.199662] random: crng init done (trusting CPU's manufacturer) [ 2.200189] Console: colour *CGA 80x25 [ 2.406140] printk: console [ttyS0] enabled [ 2.407094] Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar [ 2.408842] ... MAX_LOCKDEP_SUBCLASSES: 8 [ 2.409773] ... MAX_LOCK_DEPTH: 48 [ 2.410723] ... MAX_LOCKDEP_KEYS: 8192 [ 2.411707] ... CLASSHASH_SIZE: 4096 [ 2.412692] ... MAX_LOCKDEP_ENTRIES: 65536 [ 2.413700] ... MAX_LOCKDEP_CHAINS: 131072 [ 2.414721] ... CHAINHASH_SIZE: 65536 [ 2.415726] memory used by lock dependency info: 11641 kB [ 2.416968] memory used for stack traces: 4224 kB [ 2.418059] per task-struct memory footprint: 2688 bytes [ 2.419510] ACPI: Core revision 20211217 [ 2.421353] APIC: Switch to symmetric I/O mode setup [ 2.422941] x2apic enabled [ 2.424037] Switched APIC routing to physical x2apic. [ 2.427610] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 [ 2.429188] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x1e33052aadd, max_idle_ns: 440795310221 ns [ 2.431941] Calibrating delay loop (skipped) preset value.. 4190.15 BogoMIPS (lpj=2095076) [ 2.433904] pid_max: default: 32768 minimum: 301 [ 2.436285] LSM: Security Framework initializing [ 2.437029] Yama: becoming mindful. [ 2.437988] SELinux: Initializing. [ 2.440008] LSM support for eBPF active [ 2.441651] Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) [ 2.442967] Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) [ 2.450194] Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 [ 2.450906] Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 [ 2.452922] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 2.454906] Spectre V2 : Mitigation: IBRS [ 2.455904] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch [ 2.457903] Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT [ 2.459904] RETBleed: Mitigation: IBRS [ 2.460912] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier [ 2.462905] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl [ 2.464953] MDS: Mitigation: Clear CPU buffers [ 2.465904] TAA: Mitigation: Clear CPU buffers [ 2.466904] MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode [ 2.518827] Freeing SMP alternatives memory: 32K [ 2.521204] smpboot: CPU0: Intel Xeon Processor (Skylake, IBRS) (family: 0x6, model: 0x55, stepping: 0x4) [ 2.525129] cblist_init_generic: Setting adjustable number of callback queues. [ 2.525907] cblist_init_generic: Setting shift to 1 and lim to 1. [ 2.527272] cblist_init_generic: Setting shift to 1 and lim to 1. [ 2.528275] cblist_init_generic: Setting shift to 1 and lim to 1. [ 2.529225] Running RCU-tasks wait API self tests [ 2.633231] Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. [ 2.634539] rcu: Hierarchical SRCU implementation. [ 2.634910] rcu: Max phase no-delay instances is 400. [ 2.639999] Callback from call_rcu_tasks_trace() invoked. [ 2.642512] NMI watchdog: Perf NMI watchdog permanently disabled [ 2.643815] smp: Bringing up secondary CPUs ... [ 2.646457] x86: Booting SMP configuration: [ 2.646953] .... node #0, CPUs: #1 [ 0.226293] smpboot: CPU 1 Converting physical 0 to logical die 1 [ 2.651535] smp: Brought up 1 node, 2 CPUs [ 2.651930] smpboot: Max logical packages: 2 [ 2.652908] smpboot: Total of 2 processors activated (8380.30 BogoMIPS) [ 2.682878] node 0 deferred pages initialised in 27ms [ 2.685393] pgdatinit0 (25) used greatest stack depth: 29432 bytes left [ 2.687663] devtmpfs: initialized [ 2.689387] x86/mm: Memory block size: 128MB [ 2.733952] DMA-API: preallocated 65536 debug entries [ 2.734910] DMA-API: debugging enabled by kernel config [ 2.735910] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns [ 2.737773] Callback from call_rcu_tasks_rude() invoked. [ 2.737942] futex hash table entries: 512 (order: 4, 65536 bytes, linear) [ 2.740137] prandom: seed boundary self test passed [ 2.742323] prandom: 100 self tests passed [ 2.747092] prandom32: self test passed (less than 6 bits correlated) [ 2.747932] pinctrl core: initialized pinctrl subsystem [ 2.750114] [ 2.750500] ************************************************************* [ 2.750908] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 2.751908] ** ** [ 2.752908] ** IOMMU DebugFS SUPPORT HAS BEEN ENABLED IN THIS KERNEL ** [ 2.753909] ** ** [ 2.754908] ** This means that this kernel is built to expose internal ** [ 2.755909] ** IOMMU data structures, which may compromise security on ** [ 2.756908] ** your system. ** [ 2.757908] ** ** [ 2.758908] ** If you see this message and you are not debugging the ** [ 2.759908] ** kernel, report this immediately to your vendor! ** [ 2.760908] ** ** [ 2.761908] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 2.762908] ************************************************************* [ 2.764119] PM: RTC time: 16:29:24, date: 2023-02-02 [ 2.773178] NET: Registered PF_NETLINK/PF_ROUTE protocol family [ 2.777434] DMA: preallocated 256 KiB GFP_KERNEL pool for atomic allocations [ 2.777985] DMA: preallocated 256 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations [ 2.778974] DMA: preallocated 256 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations [ 2.780145] audit: initializing netlink subsys (disabled) [ 2.781421] audit: type=2000 audit(1675372551.554:1): state=initialized audit_enabled=0 res=1 [ 2.784566] thermal_sys: Registered thermal governor 'fair_share' [ 2.784578] thermal_sys: Registered thermal governor 'step_wise' [ 2.784914] thermal_sys: Registered thermal governor 'user_space' [ 2.786118] cpuidle: using governor menu [ 2.788473] HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB [ 2.788947] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 [ 2.791652] PCI: Using configuration type 1 for base access [ 2.841113] Callback from call_rcu_tasks() invoked. [ 2.863442] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. [ 2.904095] HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB [ 2.904931] HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages [ 2.905911] HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages [ 2.927923] cryptd: max_cpu_qlen set to 1000 [ 2.933435] ACPI: Added _OSI(Module Device) [ 2.933914] ACPI: Added _OSI(Processor Device) [ 2.934912] ACPI: Added _OSI(3.0 _SCP Extensions) [ 2.935911] ACPI: Added _OSI(Processor Aggregator Device) [ 2.937029] ACPI: Added _OSI(Linux-Dell-Video) [ 2.937923] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) [ 2.938922] ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) [ 3.024090] ACPI: 2 ACPI AML tables successfully acquired and loaded [ 3.048773] ACPI: Interpreter enabled [ 3.049149] ACPI: PM: (supports S0 S5) [ 3.049940] ACPI: Using IOAPIC for interrupt routing [ 3.051235] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 3.051910] PCI: Using E820 reservations for host bridge windows [ 3.056708] ACPI: Enabled 16 GPEs in block 00 to 0F [ 3.183376] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) [ 3.183968] acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI EDR HPX-Type3] [ 3.184913] acpi PNP0A03:00: _OSC: not requesting OS control; OS requires [ExtendedConfig ASPM ClockPM MSI] [ 3.186489] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. [ 3.206307] acpiphp: Slot [3] registered [ 3.207400] acpiphp: Slot [4] registered [ 3.208382] acpiphp: Slot [5] registered [ 3.209377] acpiphp: Slot [6] registered [ 3.210404] acpiphp: Slot [7] registered [ 3.211363] acpiphp: Slot [8] registered [ 3.212363] acpiphp: Slot [9] registered [ 3.213362] acpiphp: Slot [10] registered [ 3.214397] acpiphp: Slot [11] registered [ 3.215396] acpiphp: Slot [12] registered [ 3.216375] acpiphp: Slot [13] registered [ 3.217384] acpiphp: Slot [14] registered [ 3.218443] acpiphp: Slot [15] registered [ 3.219362] acpiphp: Slot [16] registered [ 3.220389] acpiphp: Slot [17] registered [ 3.221355] acpiphp: Slot [18] registered [ 3.222406] acpiphp: Slot [19] registered [ 3.223366] acpiphp: Slot [20] registered [ 3.224339] acpiphp: Slot [21] registered [ 3.225402] acpiphp: Slot [22] registered [ 3.226401] acpiphp: Slot [23] registered [ 3.227400] acpiphp: Slot [24] registered [ 3.228347] acpiphp: Slot [25] registered [ 3.229348] acpiphp: Slot [26] registered [ 3.230420] acpiphp: Slot [27] registered [ 3.231374] acpiphp: Slot [28] registered [ 3.232342] acpiphp: Slot [29] registered [ 3.233361] acpiphp: Slot [30] registered [ 3.234442] acpiphp: Slot [31] registered [ 3.235153] PCI host bridge to bus 0000:00 [ 3.235930] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [ 3.236921] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] [ 3.237920] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] [ 3.238920] pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] [ 3.239928] pci_bus 0000:00: root bus resource [bus 00-ff] [ 3.241442] pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 [ 3.244255] pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 [ 3.249847] pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 [ 3.254912] pci 0000:00:01.1: reg 0x20: [io 0xc0a0-0xc0af] [ 3.257965] pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] [ 3.258912] pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] [ 3.259914] pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] [ 3.260910] pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] [ 3.263328] pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 [ 3.268915] pci 0000:00:01.2: reg 0x20: [io 0xc040-0xc05f] [ 3.273378] pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 [ 3.274915] pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI [ 3.275935] pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB [ 3.280451] pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 [ 3.282911] pci 0000:00:03.0: reg 0x10: [io 0xc060-0xc07f] [ 3.285913] pci 0000:00:03.0: reg 0x14: [mem 0xfebc0000-0xfebc0fff] [ 3.296916] pci 0000:00:03.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] [ 3.301855] pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 [ 3.303911] pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] [ 3.306912] pci 0000:00:04.0: reg 0x14: [mem 0xfebc1000-0xfebc1fff] [ 3.321553] pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 [ 3.322910] pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] [ 3.348588] ACPI: PCI: Interrupt link LNKA configured for IRQ 10 [ 3.352349] ACPI: PCI: Interrupt link LNKB configured for IRQ 10 [ 3.356364] ACPI: PCI: Interrupt link LNKC configured for IRQ 11 [ 3.360247] ACPI: PCI: Interrupt link LNKD configured for IRQ 11 [ 3.362329] ACPI: PCI: Interrupt link LNKS configured for IRQ 9 [ 3.374724] iommu: Default domain type: Translated [ 3.374917] iommu: DMA domain TLB invalidation policy: lazy mode [ 3.379000] SCSI subsystem initialized [ 3.380680] ACPI: bus type USB registered [ 3.381483] usbcore: registered new interface driver usbfs [ 3.382186] usbcore: registered new interface driver hub [ 3.383075] usbcore: registered new device driver usb [ 3.384841] pps_core: LinuxPPS API ver. 1 registered [ 3.384910] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 3.385983] PTP clock support registered [ 3.387550] EDAC MC: Ver: 3.0.0 [ 3.393986] NetLabel: Initializing [ 3.394832] NetLabel: domain hash size = 128 [ 3.394909] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [ 3.396309] NetLabel: unlabeled traffic allowed by default [ 3.396912] PCI: Using ACPI for IRQ routing [ 3.399345] vgaarb: loaded [ 3.402892] clocksource: Switched to clocksource kvm-clock [ 3.943056] VFS: Disk quotas dquot_6.6.0 [ 3.944199] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 3.947399] pnp: PnP ACPI init [ 3.962276] pnp: PnP ACPI: found 5 devices [ 4.005034] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 4.007709] NET: Registered PF_INET protocol family [ 4.009696] IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) [ 4.014691] tcp_listen_portaddr_hash hash table entries: 2048 (order: 5, 163840 bytes, linear) [ 4.017039] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) [ 4.018846] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) [ 4.022077] TCP bind hash table entries: 32768 (order: 9, 2621440 bytes, linear) [ 4.029114] TCP: Hash tables configured (established 32768 bind 32768) [ 4.032355] MPTCP token hash table entries: 4096 (order: 6, 393216 bytes, linear) [ 4.034530] UDP hash table entries: 2048 (order: 6, 393216 bytes, linear) [ 4.037004] UDP-Lite hash table entries: 2048 (order: 6, 393216 bytes, linear) [ 4.040144] NET: Registered PF_UNIX/PF_LOCAL protocol family [ 4.041561] NET: Registered PF_XDP protocol family [ 4.042811] pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] [ 4.044233] pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] [ 4.045640] pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] [ 4.047184] pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] [ 4.049765] pci 0000:00:01.0: PIIX3: Enabling Passive Release [ 4.051110] pci 0000:00:00.0: Limiting direct PCI/PCI transfers [ 4.065095] ACPI: \_SB_.LNKD: Enabled at IRQ 11 [ 4.076517] pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x290 took 23424 usecs [ 4.078343] PCI: CLS 0 bytes, default 64 [ 4.079380] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [ 4.080846] software IO TLB: mapped [mem 0x000000007b000000-0x000000007f000000] (64MB) [ 4.084205] Trying to unpack rootfs image as initramfs... [ 4.094077] ACPI: bus type thunderbolt registered [ 4.096064] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x1e33052aadd, max_idle_ns: 440795310221 ns [ 4.117545] Initialise system trusted keyrings [ 4.118752] Key type blacklist registered [ 4.125687] workingset: timestamp_bits=36 max_order=19 bucket_order=0 [ 4.205532] zbud: loaded [ 4.219159] integrity: Platform Keyring initialized [ 4.230291] NET: Registered PF_ALG protocol family [ 4.231594] xor: automatically using best checksumming function avx [ 4.233289] Key type asymmetric registered [ 4.234297] Asymmetric key parser 'x509' registered [ 4.235477] Running certificate verification selftests [ 4.284807] cryptomgr_test (50) used greatest stack depth: 29048 bytes left [ 4.331936] cryptomgr_probe (49) used greatest stack depth: 28088 bytes left [ 4.335316] Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' [ 4.340369] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) [ 4.342588] io scheduler mq-deadline registered [ 4.343672] io scheduler kyber registered [ 4.346435] io scheduler bfq registered [ 4.352602] atomic64_test: passed for x86-64 platform with CX8 and with SSE [ 4.358847] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 [ 4.363039] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 [ 4.366624] ACPI: button: Power Button [PWRF] [ 4.387575] ACPI: \_SB_.LNKC: Enabled at IRQ 10 [ 4.388798] virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver [ 4.403186] virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver [ 4.422092] ACPI: \_SB_.LNKA: Enabled at IRQ 10 [ 4.423276] virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver [ 4.427220] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [ 4.429888] 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A [ 4.440277] Non-volatile memory driver v1.3 [ 4.450370] rdac: device handler registered [ 4.454116] hp_sw: device handler registered [ 4.455187] emc: device handler registered [ 4.458156] alua: device handler registered [ 4.462248] libphy: Fixed MDIO Bus: probed [ 4.470191] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver [ 4.471884] ehci-pci: EHCI PCI platform driver [ 4.473123] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver [ 4.474573] ohci-pci: OHCI PCI platform driver [ 4.475752] uhci_hcd: USB Universal Host Controller Interface driver [ 4.505762] uhci_hcd 0000:00:01.2: UHCI Host Controller [ 4.518194] uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 [ 4.520056] uhci_hcd 0000:00:01.2: detected 2 ports [ 4.522085] uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c040 [ 4.531984] usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 [ 4.534057] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 4.536050] usb usb1: Product: UHCI Host Controller [ 4.537220] usb usb1: Manufacturer: Linux 5.14.0-254.1844_765618331.el9.x86_64+debug uhci_hcd [ 4.539209] usb usb1: SerialNumber: 0000:00:01.2 [ 4.544186] hub 1-0:1.0: USB hub found [ 4.545463] hub 1-0:1.0: 2 ports detected [ 4.552080] usbcore: registered new interface driver usbserial_generic [ 4.555009] usbserial: USB Serial support registered for generic [ 4.557235] i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 [ 4.561354] serio: i8042 KBD port at 0x60,0x64 irq 1 [ 4.562624] serio: i8042 AUX port at 0x60,0x64 irq 12 [ 4.566977] mousedev: PS/2 mouse device common for all mice [ 4.571849] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 [ 4.585752] rtc_cmos 00:00: RTC can wake from S4 [ 4.591108] rtc_cmos 00:00: registered as rtc0 [ 4.592400] rtc_cmos 00:00: setting system clock to 2023-02-02T16:29:26 UTC (1675355366) [ 4.594692] rtc_cmos 00:00: alarms up to one day, 114 bytes nvram [ 4.596283] intel_pstate: CPU model not supported [ 4.599378] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 [ 4.607021] hid: raw HID events driver (C) Jiri Kosina [ 4.609276] usbcore: registered new interface driver usbhid [ 4.610556] usbhid: USB HID core driver [ 4.613569] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 [ 4.616012] drop_monitor: Initializing network drop monitor service [ 4.656062] Initializing XFRM netlink socket [ 4.660957] NET: Registered PF_INET6 protocol family [ 4.668497] Segment Routing with IPv6 [ 4.669497] NET: Registered PF_PACKET protocol family [ 4.671379] mpls_gso: MPLS GSO support [ 4.675312] No MBM correction factor available [ 4.676388] IPI shorthand broadcast: enabled [ 4.677584] AVX2 version of gcm_enc/dec engaged. [ 4.678837] AES CTR mode by8 optimization enabled [ 4.683531] sched_clock: Marking stable (4457620012, 225293233)->(4861654136, -178740891) [ 4.689317] registered taskstats version 1 [ 4.691395] Loading compiled-in X.509 certificates [ 4.695628] Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 792610c1c7eb3786fc55bec63b0c1aa63672d1e7' [ 4.699213] Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' [ 4.702967] Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' [ 4.709381] zswap: loaded using pool lzo/zbud [ 4.710870] cryptomgr_test (75) used greatest stack depth: 27920 bytes left [ 4.714019] debug_vm_pgtable: [debug_vm_pgtable ]: Validating architecture page table helpers [ 4.732504] page_owner is disabled [ 4.733888] Key type big_key registered [ 6.236243] Freeing initrd memory: 35912K [ 6.290144] Key type encrypted registered [ 6.291889] ima: No TPM chip found, activating TPM-bypass! [ 6.293865] Loading compiled-in module X.509 certificates [ 6.297618] Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 792610c1c7eb3786fc55bec63b0c1aa63672d1e7' [ 6.301318] ima: Allocated hash algorithm: sha256 [ 6.303245] ima: No architecture policies found [ 6.305554] evm: Initialising EVM extended attributes: [ 6.307278] evm: security.selinux [ 6.308389] evm: security.SMACK64 (disabled) [ 6.309772] evm: security.SMACK64EXEC (disabled) [ 6.311288] evm: security.SMACK64TRANSMUTE (disabled) [ 6.312977] evm: security.SMACK64MMAP (disabled) [ 6.314535] evm: security.apparmor (disabled) [ 6.316014] evm: security.ima [ 6.317054] evm: security.capability [ 6.318282] evm: HMAC attrs: 0x1 [ 6.363804] modprobe (84) used greatest stack depth: 27640 bytes left [ 6.370855] cryptomgr_test (82) used greatest stack depth: 27416 bytes left [ 6.438147] cryptomgr_test (87) used greatest stack depth: 27304 bytes left [ 6.868032] cryptomgr_test (190) used greatest stack depth: 27032 bytes left [ 7.031419] PM: Magic number: 11:746:488 [ 7.070605] Freeing unused decrypted memory: 2036K [ 7.079151] Freeing unused kernel image (initmem) memory: 5300K [ 7.080457] Write protecting the kernel read-only data: 57344k [ 7.089056] Freeing unused kernel image (text/rodata gap) memory: 2036K [ 7.093761] Freeing unused kernel image (rodata/data gap) memory: 1400K [ 7.169626] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 7.170554] x86/mm: Checking user space page tables [ 7.242083] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 7.243139] Run /init as init process [ 7.348821] systemd[1]: systemd 252-3.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [ 7.354500] systemd[1]: Detected virtualization kvm. [ 7.355289] systemd[1]: Detected architecture x86-64. [ 7.356592] systemd[1]: Running in initrd. Welcome to CentOS Stream 9 dracut-057-20.git20221213.el9 (Initramfs) ! [ 7.361632] systemd[1]: Hostname set to . [ 8.115781] systemd[1]: Queued start job for default target Initrd Default Target. [ 8.140166] systemd[1]: Created slice Slice /system/systemd-hibernate-resume. [ OK ] Created slice Slice /system/systemd-hibernate-resume . [ 8.145872] systemd[1]: Started Dispatch Password Requests to Console Directory Watch. [ OK ] Started Dispatch Password …ts to Console Directory Watch . [ 8.149405] systemd[1]: Reached target Initrd /usr File System. [ OK ] Reached target Initrd /usr File System . [ 8.152125] systemd[1]: Reached target Path Units. [ OK ] Reached target Path Units . [ 8.154677] systemd[1]: Reached target Slice Units. [ OK ] Reached target Slice Units . [ 8.157089] systemd[1]: Reached target Swaps. [ OK ] Reached target Swaps . [ 8.159264] systemd[1]: Reached target Timer Units. [ OK ] Reached target Timer Units . [ 8.164024] systemd[1]: Listening on D-Bus System Message Bus Socket. [ OK ] Listening on D-Bus System Message Bus Socket . [ 8.169431] systemd[1]: Listening on Journal Socket (/dev/log). [ OK ] Listening on Journal Socket (/dev/log) . [ 8.174716] systemd[1]: Listening on Journal Socket. [ OK ] Listening on Journal Socket . [ 8.180673] systemd[1]: Listening on udev Control Socket. [ OK ] Listening on udev Control Socket . [ 8.184846] systemd[1]: Listening on udev Kernel Socket. [ OK ] Listening on udev Kernel Socket . [ 8.187498] systemd[1]: Reached target Socket Units. [ OK ] Reached target Socket Units . [ 8.209575] systemd[1]: Starting Create List of Static Device Nodes... Starting Create List of Static Device Nodes ... [ 8.249421] systemd[1]: Starting Journal Service... Starting Journal Service ... [ 8.254227] systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. [ 8.275823] systemd[1]: Starting Apply Kernel Variables... Starting Apply Kernel Variables ... [ 8.324569] systemd[1]: Starting Create System Users... Starting Create System Users ... [ 8.370181] systemd[1]: Starting Setup Virtual Console... Starting Setup Virtual Console ... [ 8.431653] systemd[1]: Finished Create List of Static Device Nodes. [ OK ] Finished Create List of Static Device Nodes . [ 8.507785] systemd[1]: Finished Apply Kernel Variables. [ OK ] Finished Apply Kernel Variables . [ 8.663311] systemd[1]: Finished Create System Users. [ OK ] Finished Create System Users . [ 8.708534] systemd[1]: Starting Create Static Device Nodes in /dev... Starting Create Static Device Nodes in /dev ... [ 8.751247] systemd[1]: Started Journal Service. [ OK ] Started Journal Service . Starting Create Volatile Files and Directories ... [ OK ] Finished Create Static Device Nodes in /dev . [ OK ] Finished Create Volatile Files and Directories . [ OK ] Finished Setup Virtual Console . Starting dracut cmdline hook ... [ OK ] Finished dracut cmdline hook . Starting dracut pre-udev hook ... [ 10.719875] device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. [ 10.723831] device-mapper: uevent: version 1.0.3 [ 10.729485] device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com [ OK ] Finished dracut pre-udev hook . Starting Rule-based Manage…for Device Events and Files ... [ OK ] Started Rule-based Manager for Device Events and Files . Starting Coldplug All udev Devices ... [ OK ] Finished Coldplug All udev Devices . [ OK ] Reached target Network . Starting dracut initqueue hook ... [ 13.973294] virtio_blk virtio1: [vda] 106954752 512-byte logical blocks (54.8 GB/51.0 GiB) [ 14.120745] vda: vda1 vda2 [ 14.180008] virtio_net virtio0 ens3: renamed from eth0 [ 14.444058] scsi host0: ata_piix [ 14.452068] scsi host1: ata_piix [ 14.454889] ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0a0 irq 14 [ 14.455932] ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0a8 irq 15 [ 15.339101] cp (453) used greatest stack depth: 26440 bytes left [ OK ] Found device /dev/mapper/cs_kvm--06--guest28-root . [ 16.004106] lvm (464) used greatest stack depth: 26320 bytes left [ OK ] Reached target Initrd Root Device . [ OK ] Found device /dev/mapper/cs_kvm--06--guest28-swap . Starting Resume from hiber…er/cs_kvm--06--guest28-swap ... [ OK ] Finished Resume from hiber…pper/cs_kvm--06--guest28-swap . [ OK ] Reached target Preparation for Local File Systems . [ OK ] Reached target Local File Systems . [ OK ] Reached target System Initialization . [ OK ] Reached target Basic System . [ OK ] Finished dracut initqueue hook . [ OK ] Reached target Preparation for Remote File Systems . [ OK ] Reached target Remote File Systems . Starting dracut pre-mount hook ... [ OK ] Finished dracut pre-mount hook . Starting File System Check…er/cs_kvm--06--guest28-root ... [ OK ] Finished File System Check…pper/cs_kvm--06--guest28-root . Mounting /sysroot ... [ 17.987720] SGI XFS with ACLs, security attributes, scrub, verbose warnings, quota, no debug enabled [ 18.043788] XFS (dm-0): Mounting V5 Filesystem [ 18.094726] XFS (dm-0): Ending clean mount [ 18.108584] mount (493) used greatest stack depth: 24960 bytes left [ OK ] Mounted /sysroot . [ OK ] Reached target Initrd Root File System . Starting Mountpoints Configured in the Real Root ... [ 18.222518] systemd-fstab-g (505) used greatest stack depth: 23584 bytes left [ OK ] Finished Mountpoints Configured in the Real Root . [ OK ] Reached target Initrd File Systems . [ OK ] Reached target Initrd Default Target . Starting dracut pre-pivot and cleanup hook ... [ OK ] Finished dracut pre-pivot and cleanup hook . Starting Cleaning Up and Shutting Down Daemons ... [ OK ] Stopped target Network . [ OK ] Stopped target Timer Units . [ OK ] Closed D-Bus System Message Bus Socket . [ OK ] Stopped dracut pre-pivot and cleanup hook . [ OK ] Stopped target Initrd Default Target . [ OK ] Stopped target Basic System . [ OK ] Stopped target Initrd Root Device . [ OK ] Stopped target Initrd /usr File System . [ OK ] Stopped target Path Units . [ OK ] Stopped Dispatch Password …ts to Console Directory Watch . [ OK ] Stopped target Remote File Systems . [ OK ] Stopped target Preparation for Remote File Systems . [ OK ] Stopped target Slice Units . [ OK ] Stopped target Socket Units . [ OK ] Stopped target System Initialization . [ OK ] Stopped target Local File Systems . [ OK ] Stopped target Preparation for Local File Systems . [ OK ] Stopped target Swaps . [ OK ] Stopped dracut pre-mount hook . [ OK ] Stopped dracut initqueue hook . [ OK ] Stopped Apply Kernel Variables . [ OK ] Stopped Create Volatile Files and Directories . [ OK ] Stopped Coldplug All udev Devices . Stopping Rule-based Manage…for Device Events and Files ... [ OK ] Stopped Setup Virtual Console . [ OK ] Finished Cleaning Up and Shutting Down Daemons . [ OK ] Stopped Rule-based Manager for Device Events and Files . [ OK ] Closed udev Control Socket . [ OK ] Closed udev Kernel Socket . [ OK ] Stopped dracut pre-udev hook . [ OK ] Stopped dracut cmdline hook . Starting Cleanup udev Database ... [ OK ] Stopped Create Static Device Nodes in /dev . [ OK ] Stopped Create List of Static Device Nodes . [ OK ] Stopped Create System Users . [ OK ] Finished Cleanup udev Database . [ OK ] Reached target Switch Root . Starting Switch Root ... [ 19.532497] systemd-journald[233]: Received SIGTERM from PID 1 (systemd). [ 22.363719] SELinux: policy capability network_peer_controls=1 [ 22.364730] SELinux: policy capability open_perms=1 [ 22.365460] SELinux: policy capability extended_socket_class=1 [ 22.366298] SELinux: policy capability always_check_network=0 [ 22.367132] SELinux: policy capability cgroup_seclabel=1 [ 22.367878] SELinux: policy capability nnp_nosuid_transition=1 [ 22.368706] SELinux: policy capability genfs_seclabel_symlinks=1 [ 22.901095] audit: type=1403 audit(1675355384.807:2): auid=4294967295 ses=4294967295 lsm=selinux res=1 [ 22.926742] systemd[1]: Successfully loaded SELinux policy in 2.420979s. [ 23.060579] systemd[1]: RTC configured in localtime, applying delta of -300 minutes to system time. [ 23.299359] systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 204.601ms. [ 23.343812] systemd[1]: systemd 252-3.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [ 23.351048] systemd[1]: Detected virtualization kvm. [ 23.351798] systemd[1]: Detected architecture x86-64. Welcome to CentOS Stream 9 ! [ 24.107039] systemd-rc-local-generator[553]: /etc/rc.d/rc.local is not marked executable, skipping. [ 24.662456] systemd[1]: /usr/lib/systemd/system/restraintd.service:8: Standard output type syslog+console is obsolete, automatically updating to journal+console. Please update your unit file, and consider removing the setting altogether. [ 24.947385] systemd[1]: initrd-switch-root.service: Deactivated successfully. [ 24.953317] systemd[1]: Stopped Switch Root. [ OK ] Stopped Switch Root . [ 24.961146] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 24.970452] systemd[1]: Created slice Slice /system/getty. [ OK ] Created slice Slice /system/getty . [ 24.981798] systemd[1]: Created slice Slice /system/modprobe. [ OK ] Created slice Slice /system/modprobe . [ 24.991342] systemd[1]: Created slice Slice /system/serial-getty. [ OK ] Created slice Slice /system/serial-getty . [ 25.000537] systemd[1]: Created slice Slice /system/sshd-keygen. [ OK ] Created slice Slice /system/sshd-keygen . [ 25.013190] systemd[1]: Created slice User and Session Slice. [ OK ] Created slice User and Session Slice . [ 25.018026] systemd[1]: Started Dispatch Password Requests to Console Directory Watch. [ OK ] Started Dispatch Password …ts to Console Directory Watch . [ 25.023125] systemd[1]: Started Forward Password Requests to Wall Directory Watch. [ OK ] Started Forward Password R…uests to Wall Directory Watch . [ 25.030884] systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. [ OK ] Set up automount Arbitrary…s File System Automount Point . [ 25.034321] systemd[1]: Reached target Local Encrypted Volumes. [ OK ] Reached target Local Encrypted Volumes . [ 25.037042] systemd[1]: Stopped target Switch Root. [ OK ] Stopped target Switch Root . [ 25.039240] systemd[1]: Stopped target Initrd File Systems. [ OK ] Stopped target Initrd File Systems . [ 25.041583] systemd[1]: Stopped target Initrd Root File System. [ OK ] Stopped target Initrd Root File System . [ 25.045356] systemd[1]: Reached target Local Integrity Protected Volumes. [ OK ] Reached target Local Integrity Protected Volumes . [ 25.048192] systemd[1]: Reached target Slice Units. [ OK ] Reached target Slice Units . [ 25.050356] systemd[1]: Reached target System Time Set. [ OK ] Reached target System Time Set . [ 25.052674] systemd[1]: Reached target Local Verity Protected Volumes. [ OK ] Reached target Local Verity Protected Volumes . [ 25.058528] systemd[1]: Listening on Device-mapper event daemon FIFOs. [ OK ] Listening on Device-mapper event daemon FIFOs . [ 25.067813] systemd[1]: Listening on LVM2 poll daemon socket. [ OK ] Listening on LVM2 poll daemon socket . [ 25.176404] systemd[1]: Listening on RPCbind Server Activation Socket. [ OK ] Listening on RPCbind Server Activation Socket . [ 25.179522] systemd[1]: Reached target RPC Port Mapper. [ OK ] Reached target RPC Port Mapper . [ 25.191663] systemd[1]: Listening on Process Core Dump Socket. [ OK ] Listening on Process Core Dump Socket . [ 25.197540] systemd[1]: Listening on initctl Compatibility Named Pipe. [ OK ] Listening on initctl Compatibility Named Pipe . [ 25.207283] systemd[1]: Listening on udev Control Socket. [ OK ] Listening on udev Control Socket . [ 25.212864] systemd[1]: Listening on udev Kernel Socket. [ OK ] Listening on udev Kernel Socket . [ 25.234672] systemd[1]: Activating swap /dev/mapper/cs_kvm--06--guest28-swap... Activating swap /dev/mapper/cs_kvm--06--guest28-swap ... [ 25.264227] systemd[1]: Mounting Huge Pages File System... Mounting Huge Pages File System ... [ 25.293107] systemd[1]: Mounting POSIX Message Queue File System... Mounting POSIX Message Queue File System ... [ 25.327807] systemd[1]: Mounting Kernel Debug File System... Mounting Kernel Debug File System ... [ 25.358545] systemd[1]: Mounting Kernel Trace File System... Mounting Kernel Trace File System ... [ 25.366231] systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). [ 25.386055] Adding 4145148k swap on /dev/mapper/cs_kvm--06--guest28-swap. Priority:-2 extents:1 across:4145148k FS [ 25.448382] systemd[1]: Starting Create List of Static Device Nodes... Starting Create List of Static Device Nodes ... [ 25.473226] systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Starting Monitoring of LVM…meventd or progress polling ... [ 25.508100] systemd[1]: Starting Load Kernel Module configfs... Starting Load Kernel Module configfs ... [ 25.533498] systemd[1]: Starting Load Kernel Module drm... Starting Load Kernel Module drm ... [ 25.586142] systemd[1]: Starting Load Kernel Module fuse... Starting Load Kernel Module fuse ... [ 25.645362] systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Starting Read and set NIS …from /etc/sysconfig/network ... [ 25.671078] systemd[1]: systemd-fsck-root.service: Deactivated successfully. [ 25.673390] systemd[1]: Stopped File System Check on Root Device. [ OK ] Stopped File System Check on Root Device . [ 25.685094] systemd[1]: Stopped Journal Service. [ OK ] Stopped Journal Service . [ 25.780363] systemd[1]: Starting Journal Service... Starting Journal Service ... [ 25.791519] systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. [ 25.818114] fuse: init (API version 7.36) [ 25.855873] systemd[1]: Starting Generate network units from Kernel command line... Starting Generate network …ts from Kernel command line ... [ 25.935596] systemd[1]: Starting Remount Root and Kernel File Systems... Starting Remount Root and Kernel File Systems ... [ 25.945721] systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. [ 26.012329] systemd[1]: Starting Apply Kernel Variables... Starting Apply Kernel Variables ... [ 26.015540] ACPI: bus type drm_connector registered [ 26.068269] systemd[1]: Starting Coldplug All udev Devices... Starting Coldplug All udev Devices ... [ 26.167577] systemd[1]: Activated swap /dev/mapper/cs_kvm--06--guest28-swap. [ OK ] Activated swap /dev/mapper/cs_kvm--06--guest28-swap . [ 26.237751] systemd[1]: Started Journal Service. [ OK ] Started Journal Service . [ OK ] Mounted Huge Pages File System . [ OK ] Mounted POSIX Message Queue File System . [ OK ] Mounted Kernel Debug File System . [ OK ] Mounted Kernel Trace File System . [ OK ] Finished Create List of Static Device Nodes . [ OK ] Finished Monitoring of LVM… dmeventd or progress polling . [ OK ] Finished Load Kernel Module configfs . [ OK ] Finished Load Kernel Module drm . [ OK ] Finished Load Kernel Module fuse . [ OK ] Finished Read and set NIS …e from /etc/sysconfig/network . [ OK ] Finished Generate network units from Kernel command line . [ OK ] Finished Remount Root and Kernel File Systems . [ OK ] Finished Apply Kernel Variables . [ OK ] Reached target Preparation for Network . [ OK ] Reached target Swaps . Mounting FUSE Control File System ... Mounting Kernel Configuration File System ... Starting Flush Journal to Persistent Storage ... Starting Load/Save Random Seed ... Starting Create Static Device Nodes in /dev ... [ 26.728497] systemd-journald[573]: Received client request to flush runtime journal. [ OK ] Mounted FUSE Control File System . [ OK ] Mounted Kernel Configuration File System . [ OK ] Finished Load/Save Random Seed . [ OK ] Finished Flush Journal to Persistent Storage . [ OK ] Finished Create Static Device Nodes in /dev . [ OK ] Reached target Preparation for Local File Systems . Starting Rule-based Manage…for Device Events and Files ... [ OK ] Started Rule-based Manager for Device Events and Files . Starting Load Kernel Module configfs ... [ OK ] Finished Load Kernel Module configfs . [ OK ] Finished Coldplug All udev Devices . Mounting /boot ... [ 29.195205] XFS (vda1): Mounting V5 Filesystem [ 29.279178] XFS (vda1): Ending clean mount [ OK ] Mounted /boot . [ OK ] Reached target Local File Systems . Starting Automatic Boot Loader Update ... Starting Create Volatile Files and Directories ... [ OK ] Finished Automatic Boot Loader Update . [ 30.137264] piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 [ 30.167054] systemd-tmpfile (623) used greatest stack depth: 21160 bytes left [ OK ] Finished Create Volatile Files and Directories . Mounting RPC Pipe File System ... [ 30.267093] input: PC Speaker as /devices/platform/pcspkr/input/input5 Starting Security Auditing Service ... Starting RPC Bind ... [ OK ] Started RPC Bind . [ 30.890859] RPC: Registered named UNIX socket transport module. [ 30.902006] RPC: Registered udp transport module. [ 30.902895] RPC: Registered tcp transport module. [ 30.903816] RPC: Registered tcp NFSv4.1 backchannel transport module. [ OK ] Mounted RPC Pipe File System . [ OK ] Reached target rpc_pipefs.target . [ OK ] Started /usr/sbin/lvm vgch…ation event cs_kvm-06-guest28 . [ OK ] Started Security Auditing Service . Starting Record System Boot/Shutdown in UTMP ... [ OK ] Finished Record System Boot/Shutdown in UTMP . [ OK ] Reached target System Initialization . [ OK ] Started CUPS Scheduler . [ OK ] Started dnf makecache --timer . [ OK ] Started Daily Cleanup of Temporary Directories . [ OK ] Reached target Path Units . [ OK ] Listening on Avahi mDNS/DNS-SD Stack Activation Socket . [ OK ] Listening on CUPS Scheduler . [ OK ] Listening on D-Bus System Message Bus Socket . [ OK ] Listening on SSSD Kerberos…ache Manager responder socket . [ OK ] Reached target Socket Units . [ OK ] Reached target Basic System . Starting Network Manager ... Starting Avahi mDNS/DNS-SD Stack ... Starting NTP client/server ... Starting Restore /run/initramfs on shutdown ... [ OK ] Started irqbalance daemon . Starting System Logging Service ... [ OK ] Reached target sshd-keygen.target . [ OK ] Reached target User and Group Name Lookups . Starting User Login Management ... [ OK ] Started System Logging Service . [ OK ] Finished Restore /run/initramfs on shutdown . Starting D-Bus System Message Bus ... [ OK ] Started NTP client/server . Starting Wait for chrony to synchronize system clock ... [ OK ] Started D-Bus System Message Bus . [ OK ] Started User Login Management . [ OK ] Started Avahi mDNS/DNS-SD Stack . [ OK ] Started Network Manager . [ OK ] Created slice User Slice of UID 0 . [ OK ] Reached target Network . Starting Network Manager Wait Online ... Starting CUPS Scheduler ... Starting GSSAPI Proxy Daemon ... Starting OpenSSH server daemon ... Starting User Runtime Directory /run/user/0 ... Starting Hostname Service ... [ OK ] Finished User Runtime Directory /run/user/0 . Starting User Manager for UID 0 ... [ OK ] Started OpenSSH server daemon . [ OK ] Started GSSAPI Proxy Daemon . [ OK ] Reached target NFS client services . [ OK ] Reached target Preparation for Remote File Systems . [ OK ] Started CUPS Scheduler . [ OK ] Started Hostname Service . [ OK ] Listening on Load/Save RF …itch Status /dev/rfkill Watch . Starting Network Manager Script Dispatcher Service ... [ OK ] Started Network Manager Script Dispatcher Service . [ OK ] Finished Network Manager Wait Online . [ OK ] Reached target Network is Online . Mounting /var/crash ... [ OK ] Started Anaconda Monitorin…ost-boot notification program . Starting Notify NFS peers of a restart ... [ OK ] Started Notify NFS peers of a restart . [ 36.112114] FS-Cache: Loaded [ OK ] Started User Manager for UID 0 . [ 36.611085] Key type dns_resolver registered [ 37.201432] NFS: Registering the id_resolver key type [ 37.202378] Key type id_resolver registered [ 37.203027] Key type id_legacy registered [ OK ] Mounted /var/crash . [ OK ] Reached target Remote File Systems . Starting Crash recovery kernel arming ... Starting Permit User Sessions ... [ OK ] Finished Permit User Sessions . [ OK ] Started Deferred execution scheduler . [ [0[-- MARK -- Thu Feb 2 21:30:00 2023] ;32m OK ] Started Getty on tty1 . [ OK ] Started Serial Getty on ttyS0 . [ OK ] Reached target Login Prompts . [ 44.271383] PKCS7: Message signed outside of X.509 validity window CentOS Stream 9 Kernel 5.14.0-254.1844_765618331.el9.x86_64+debug on an x86_64 kvm-06-guest28 login: [ 47.751807] restraintd[1009]: * Fetching recipe: http://lab-02.hosts.prod.psi.bos.redhat.com:8000//recipes/13327125/ [ 47.913032] restraintd[1009]: * Parsing recipe [ 47.924991] restraintd[1009]: * Running recipe [ 47.926818] restraintd[1009]: ** Continuing task: 155711322 [/mnt/tests/github.com/beaker-project/beaker-core-tasks/archive/master.tar.gz/reservesys] [ 47.935775] restraintd[1009]: ** Preparing metadata [ 48.068003] restraintd[1009]: ** Refreshing peer role hostnames: Retries 0 [ 48.201803] restraintd[1009]: ** Updating env vars [ 48.204879] restraintd[1009]: *** Current Time: Thu Feb 02 16:30:10 2023 Localwatchdog at: * Disabled! * [ 48.231668] restraintd[1009]: ** Running task: 155711322 [/distribution/reservesys] [ 52.309346] Running test [R:13327125 T:155711322 - /distribution/reservesys - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [ 52.471073] Running test [R:13327125 T:14 - Reboot test - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug] [ 85.738405] Running test [R:13327125 T:15 - /distribution/command - Kernel: 5.14.0-254.1844_765618331.el9.x86_64+debug]